Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/util-linux-2.36.1/libblkid/samples/mkfs.c
Examining data/util-linux-2.36.1/libblkid/samples/topology.c
Examining data/util-linux-2.36.1/libblkid/samples/partitions.c
Examining data/util-linux-2.36.1/libblkid/samples/superblocks.c
Examining data/util-linux-2.36.1/libblkid/src/cache.c
Examining data/util-linux-2.36.1/libblkid/src/config.c
Examining data/util-linux-2.36.1/libblkid/src/devname.c
Examining data/util-linux-2.36.1/libblkid/src/resolve.c
Examining data/util-linux-2.36.1/libblkid/src/read.c
Examining data/util-linux-2.36.1/libblkid/src/dev.c
Examining data/util-linux-2.36.1/libblkid/src/topology/md.c
Examining data/util-linux-2.36.1/libblkid/src/topology/topology.h
Examining data/util-linux-2.36.1/libblkid/src/topology/sysfs.c
Examining data/util-linux-2.36.1/libblkid/src/topology/ioctl.c
Examining data/util-linux-2.36.1/libblkid/src/topology/topology.c
Examining data/util-linux-2.36.1/libblkid/src/topology/evms.c
Examining data/util-linux-2.36.1/libblkid/src/topology/dm.c
Examining data/util-linux-2.36.1/libblkid/src/topology/lvm.c
Examining data/util-linux-2.36.1/libblkid/src/tag.c
Examining data/util-linux-2.36.1/libblkid/src/save.c
Examining data/util-linux-2.36.1/libblkid/src/version.c
Examining data/util-linux-2.36.1/libblkid/src/verify.c
Examining data/util-linux-2.36.1/libblkid/src/encode.c
Examining data/util-linux-2.36.1/libblkid/src/init.c
Examining data/util-linux-2.36.1/libblkid/src/probe.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/partitions.h
Examining data/util-linux-2.36.1/libblkid/src/partitions/gpt.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/aix.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/dos.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/minix.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/sgi.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/atari.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/bsd.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/mac.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/ultrix.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/unixware.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/solaris_x86.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/partitions.c
Examining data/util-linux-2.36.1/libblkid/src/partitions/aix.h
Examining data/util-linux-2.36.1/libblkid/src/partitions/sun.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/hfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/zfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/vmfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/f2fs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/sysv.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/hpfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/bluestore.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/vdo.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/ext.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/nilfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/nvidia_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/via_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/exfat.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/silicon_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/ubi.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/highpoint_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/ubifs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/minix.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/cramfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/btrfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/lsi_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/adaptec_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/refs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/zonefs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/mpool.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/linux_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/netware.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/drbd.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/ufs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/bfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/romfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/vxfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/jmicron_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.h
Examining data/util-linux-2.36.1/libblkid/src/superblocks/ddf_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/exfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/squashfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/gfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/xfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/promise_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/ntfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/befs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/isw_raid.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/lvm.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/apfs.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/bcache.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/luks.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/udf.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/drbdproxy_datalog.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/stratis.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c
Examining data/util-linux-2.36.1/libblkid/src/superblocks/swap.c
Examining data/util-linux-2.36.1/libblkid/src/blkidP.h
Examining data/util-linux-2.36.1/libblkid/src/evaluate.c
Examining data/util-linux-2.36.1/libblkid/src/devno.c
Examining data/util-linux-2.36.1/libblkid/src/getsize.c
Examining data/util-linux-2.36.1/misc-utils/namei.c
Examining data/util-linux-2.36.1/misc-utils/cal.c
Examining data/util-linux-2.36.1/misc-utils/hardlink.c
Examining data/util-linux-2.36.1/misc-utils/fincore.c
Examining data/util-linux-2.36.1/misc-utils/findfs.c
Examining data/util-linux-2.36.1/misc-utils/look.c
Examining data/util-linux-2.36.1/misc-utils/lsblk.h
Examining data/util-linux-2.36.1/misc-utils/uuidparse.c
Examining data/util-linux-2.36.1/misc-utils/uuidd.c
Examining data/util-linux-2.36.1/misc-utils/findmnt.h
Examining data/util-linux-2.36.1/misc-utils/getopt.c
Examining data/util-linux-2.36.1/misc-utils/lsblk-properties.c
Examining data/util-linux-2.36.1/misc-utils/lsblk-devtree.c
Examining data/util-linux-2.36.1/misc-utils/kill.c
Examining data/util-linux-2.36.1/misc-utils/logger.c
Examining data/util-linux-2.36.1/misc-utils/test_uuidd.c
Examining data/util-linux-2.36.1/misc-utils/findmnt.c
Examining data/util-linux-2.36.1/misc-utils/findmnt-verify.c
Examining data/util-linux-2.36.1/misc-utils/blkid.c
Examining data/util-linux-2.36.1/misc-utils/wipefs.c
Examining data/util-linux-2.36.1/misc-utils/rename.c
Examining data/util-linux-2.36.1/misc-utils/whereis.c
Examining data/util-linux-2.36.1/misc-utils/lslocks.c
Examining data/util-linux-2.36.1/misc-utils/lsblk-mnt.c
Examining data/util-linux-2.36.1/misc-utils/mcookie.c
Examining data/util-linux-2.36.1/misc-utils/lsblk.c
Examining data/util-linux-2.36.1/misc-utils/uuidgen.c
Examining data/util-linux-2.36.1/sys-utils/dmesg.c
Examining data/util-linux-2.36.1/sys-utils/eject.c
Examining data/util-linux-2.36.1/sys-utils/setarch.c
Examining data/util-linux-2.36.1/sys-utils/lscpu.c
Examining data/util-linux-2.36.1/sys-utils/lsipc.c
Examining data/util-linux-2.36.1/sys-utils/mount.c
Examining data/util-linux-2.36.1/sys-utils/wdctl.c
Examining data/util-linux-2.36.1/sys-utils/fstrim.c
Examining data/util-linux-2.36.1/sys-utils/hwclock-rtc.c
Examining data/util-linux-2.36.1/sys-utils/lscpu-dmi.c
Examining data/util-linux-2.36.1/sys-utils/rfkill.c
Examining data/util-linux-2.36.1/sys-utils/flock.c
Examining data/util-linux-2.36.1/sys-utils/swapoff.c
Examining data/util-linux-2.36.1/sys-utils/ctrlaltdel.c
Examining data/util-linux-2.36.1/sys-utils/rtcwake.c
Examining data/util-linux-2.36.1/sys-utils/readprofile.c
Examining data/util-linux-2.36.1/sys-utils/pivot_root.c
Examining data/util-linux-2.36.1/sys-utils/blkzone.c
Examining data/util-linux-2.36.1/sys-utils/lsns.c
Examining data/util-linux-2.36.1/sys-utils/prlimit.c
Examining data/util-linux-2.36.1/sys-utils/ipcutils.c
Examining data/util-linux-2.36.1/sys-utils/choom.c
Examining data/util-linux-2.36.1/sys-utils/chmem.c
Examining data/util-linux-2.36.1/sys-utils/ldattach.c
Examining data/util-linux-2.36.1/sys-utils/zramctl.c
Examining data/util-linux-2.36.1/sys-utils/ipcutils.h
Examining data/util-linux-2.36.1/sys-utils/hwclock-cmos.c
Examining data/util-linux-2.36.1/sys-utils/umount.c
Examining data/util-linux-2.36.1/sys-utils/swapon.c
Examining data/util-linux-2.36.1/sys-utils/nsenter.c
Examining data/util-linux-2.36.1/sys-utils/chcpu.c
Examining data/util-linux-2.36.1/sys-utils/lscpu.h
Examining data/util-linux-2.36.1/sys-utils/mountpoint.c
Examining data/util-linux-2.36.1/sys-utils/ipcrm.c
Examining data/util-linux-2.36.1/sys-utils/blkdiscard.c
Examining data/util-linux-2.36.1/sys-utils/lsirq.c
Examining data/util-linux-2.36.1/sys-utils/irq-common.c
Examining data/util-linux-2.36.1/sys-utils/irq-common.h
Examining data/util-linux-2.36.1/sys-utils/swapon-common.h
Examining data/util-linux-2.36.1/sys-utils/ipcmk.c
Examining data/util-linux-2.36.1/sys-utils/swapon-common.c
Examining data/util-linux-2.36.1/sys-utils/fallocate.c
Examining data/util-linux-2.36.1/sys-utils/lscpu-arm.c
Examining data/util-linux-2.36.1/sys-utils/switch_root.c
Examining data/util-linux-2.36.1/sys-utils/renice.c
Examining data/util-linux-2.36.1/sys-utils/hwclock.h
Examining data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c
Examining data/util-linux-2.36.1/sys-utils/lsmem.c
Examining data/util-linux-2.36.1/sys-utils/setpriv.c
Examining data/util-linux-2.36.1/sys-utils/ipcs.c
Examining data/util-linux-2.36.1/sys-utils/setsid.c
Examining data/util-linux-2.36.1/sys-utils/tunelp.c
Examining data/util-linux-2.36.1/sys-utils/irqtop.c
Examining data/util-linux-2.36.1/sys-utils/unshare.c
Examining data/util-linux-2.36.1/sys-utils/losetup.c
Examining data/util-linux-2.36.1/sys-utils/fsfreeze.c
Examining data/util-linux-2.36.1/sys-utils/hwclock.c
Examining data/util-linux-2.36.1/lib/monotonic.c
Examining data/util-linux-2.36.1/lib/pty-session.c
Examining data/util-linux-2.36.1/lib/loopdev.c
Examining data/util-linux-2.36.1/lib/canonicalize.c
Examining data/util-linux-2.36.1/lib/mbsedit.c
Examining data/util-linux-2.36.1/lib/caputils.c
Examining data/util-linux-2.36.1/lib/crc32.c
Examining data/util-linux-2.36.1/lib/ismounted.c
Examining data/util-linux-2.36.1/lib/randutils.c
Examining data/util-linux-2.36.1/lib/pwdutils.c
Examining data/util-linux-2.36.1/lib/timer.c
Examining data/util-linux-2.36.1/lib/fileutils.c
Examining data/util-linux-2.36.1/lib/mangle.c
Examining data/util-linux-2.36.1/lib/color-names.c
Examining data/util-linux-2.36.1/lib/match.c
Examining data/util-linux-2.36.1/lib/procutils.c
Examining data/util-linux-2.36.1/lib/strutils.c
Examining data/util-linux-2.36.1/lib/env.c
Examining data/util-linux-2.36.1/lib/timeutils.c
Examining data/util-linux-2.36.1/lib/exec_shell.c
Examining data/util-linux-2.36.1/lib/crc32c.c
Examining data/util-linux-2.36.1/lib/path.c
Examining data/util-linux-2.36.1/lib/signames.c
Examining data/util-linux-2.36.1/lib/sysfs.c
Examining data/util-linux-2.36.1/lib/colors.c
Examining data/util-linux-2.36.1/lib/mbsalign.c
Examining data/util-linux-2.36.1/lib/linux_version.c
Examining data/util-linux-2.36.1/lib/encode.c
Examining data/util-linux-2.36.1/lib/strv.c
Examining data/util-linux-2.36.1/lib/ttyutils.c
Examining data/util-linux-2.36.1/lib/blkdev.c
Examining data/util-linux-2.36.1/lib/idcache.c
Examining data/util-linux-2.36.1/lib/langinfo.c
Examining data/util-linux-2.36.1/lib/swapprober.c
Examining data/util-linux-2.36.1/lib/plymouth-ctrl.c
Examining data/util-linux-2.36.1/lib/setproctitle.c
Examining data/util-linux-2.36.1/lib/sha1.c
Examining data/util-linux-2.36.1/lib/pager.c
Examining data/util-linux-2.36.1/lib/md5.c
Examining data/util-linux-2.36.1/lib/cpuset.c
Examining data/util-linux-2.36.1/text-utils/ul.c
Examining data/util-linux-2.36.1/text-utils/hexdump-parse.c
Examining data/util-linux-2.36.1/text-utils/rev.c
Examining data/util-linux-2.36.1/text-utils/pg.c
Examining data/util-linux-2.36.1/text-utils/hexdump.h
Examining data/util-linux-2.36.1/text-utils/col.c
Examining data/util-linux-2.36.1/text-utils/hexdump.c
Examining data/util-linux-2.36.1/text-utils/colcrt.c
Examining data/util-linux-2.36.1/text-utils/hexdump-display.c
Examining data/util-linux-2.36.1/text-utils/colrm.c
Examining data/util-linux-2.36.1/text-utils/more.c
Examining data/util-linux-2.36.1/text-utils/hexdump-conv.c
Examining data/util-linux-2.36.1/text-utils/line.c
Examining data/util-linux-2.36.1/text-utils/column.c
Examining data/util-linux-2.36.1/libuuid/src/gen_uuid.c
Examining data/util-linux-2.36.1/libuuid/src/clear.c
Examining data/util-linux-2.36.1/libuuid/src/unparse.c
Examining data/util-linux-2.36.1/libuuid/src/unpack.c
Examining data/util-linux-2.36.1/libuuid/src/test_uuid.c
Examining data/util-linux-2.36.1/libuuid/src/parse.c
Examining data/util-linux-2.36.1/libuuid/src/uuidP.h
Examining data/util-linux-2.36.1/libuuid/src/uuid.h
Examining data/util-linux-2.36.1/libuuid/src/uuid_time.c
Examining data/util-linux-2.36.1/libuuid/src/predefined.c
Examining data/util-linux-2.36.1/libuuid/src/uuidd.h
Examining data/util-linux-2.36.1/libuuid/src/compare.c
Examining data/util-linux-2.36.1/libuuid/src/copy.c
Examining data/util-linux-2.36.1/libuuid/src/isnull.c
Examining data/util-linux-2.36.1/libuuid/src/pack.c
Examining data/util-linux-2.36.1/libsmartcols/samples/grouping-overlay.c
Examining data/util-linux-2.36.1/libsmartcols/samples/continuous.c
Examining data/util-linux-2.36.1/libsmartcols/samples/tree.c
Examining data/util-linux-2.36.1/libsmartcols/samples/fromfile.c
Examining data/util-linux-2.36.1/libsmartcols/samples/grouping-simple.c
Examining data/util-linux-2.36.1/libsmartcols/samples/maxout.c
Examining data/util-linux-2.36.1/libsmartcols/samples/title.c
Examining data/util-linux-2.36.1/libsmartcols/samples/wrap.c
Examining data/util-linux-2.36.1/libsmartcols/src/print.c
Examining data/util-linux-2.36.1/libsmartcols/src/calculate.c
Examining data/util-linux-2.36.1/libsmartcols/src/walk.c
Examining data/util-linux-2.36.1/libsmartcols/src/cell.c
Examining data/util-linux-2.36.1/libsmartcols/src/buffer.c
Examining data/util-linux-2.36.1/libsmartcols/src/smartcolsP.h
Examining data/util-linux-2.36.1/libsmartcols/src/version.c
Examining data/util-linux-2.36.1/libsmartcols/src/table.c
Examining data/util-linux-2.36.1/libsmartcols/src/print-api.c
Examining data/util-linux-2.36.1/libsmartcols/src/init.c
Examining data/util-linux-2.36.1/libsmartcols/src/iter.c
Examining data/util-linux-2.36.1/libsmartcols/src/line.c
Examining data/util-linux-2.36.1/libsmartcols/src/grouping.c
Examining data/util-linux-2.36.1/libsmartcols/src/column.c
Examining data/util-linux-2.36.1/libsmartcols/src/symbols.c
Examining data/util-linux-2.36.1/libsmartcols/src/fput.c
Examining data/util-linux-2.36.1/include/env.h
Examining data/util-linux-2.36.1/include/rpmatch.h
Examining data/util-linux-2.36.1/include/md5.h
Examining data/util-linux-2.36.1/include/plymouth-ctrl.h
Examining data/util-linux-2.36.1/include/swapprober.h
Examining data/util-linux-2.36.1/include/optutils.h
Examining data/util-linux-2.36.1/include/path.h
Examining data/util-linux-2.36.1/include/loopdev.h
Examining data/util-linux-2.36.1/include/idcache.h
Examining data/util-linux-2.36.1/include/debugobj.h
Examining data/util-linux-2.36.1/include/ttyutils.h
Examining data/util-linux-2.36.1/include/c.h
Examining data/util-linux-2.36.1/include/match.h
Examining data/util-linux-2.36.1/include/linux_version.h
Examining data/util-linux-2.36.1/include/pidfd-utils.h
Examining data/util-linux-2.36.1/include/procutils.h
Examining data/util-linux-2.36.1/include/xalloc.h
Examining data/util-linux-2.36.1/include/bitops.h
Examining data/util-linux-2.36.1/include/timer.h
Examining data/util-linux-2.36.1/include/timeutils.h
Examining data/util-linux-2.36.1/include/exitcodes.h
Examining data/util-linux-2.36.1/include/mbsedit.h
Examining data/util-linux-2.36.1/include/pwdutils.h
Examining data/util-linux-2.36.1/include/widechar.h
Examining data/util-linux-2.36.1/include/fileutils.h
Examining data/util-linux-2.36.1/include/nls.h
Examining data/util-linux-2.36.1/include/partx.h
Examining data/util-linux-2.36.1/include/encode.h
Examining data/util-linux-2.36.1/include/colors.h
Examining data/util-linux-2.36.1/include/swapheader.h
Examining data/util-linux-2.36.1/include/minix.h
Examining data/util-linux-2.36.1/include/sha1.h
Examining data/util-linux-2.36.1/include/pt-sun.h
Examining data/util-linux-2.36.1/include/pathnames.h
Examining data/util-linux-2.36.1/include/pty-session.h
Examining data/util-linux-2.36.1/include/statfs_magic.h
Examining data/util-linux-2.36.1/include/ismounted.h
Examining data/util-linux-2.36.1/include/debug.h
Examining data/util-linux-2.36.1/include/monotonic.h
Examining data/util-linux-2.36.1/include/pt-mbr.h
Examining data/util-linux-2.36.1/include/crc32.h
Examining data/util-linux-2.36.1/include/namespace.h
Examining data/util-linux-2.36.1/include/strv.h
Examining data/util-linux-2.36.1/include/all-io.h
Examining data/util-linux-2.36.1/include/color-names.h
Examining data/util-linux-2.36.1/include/iso9660.h
Examining data/util-linux-2.36.1/include/pager.h
Examining data/util-linux-2.36.1/include/randutils.h
Examining data/util-linux-2.36.1/include/pt-bsd.h
Examining data/util-linux-2.36.1/include/exec_shell.h
Examining data/util-linux-2.36.1/include/canonicalize.h
Examining data/util-linux-2.36.1/include/caputils.h
Examining data/util-linux-2.36.1/include/cctype.h
Examining data/util-linux-2.36.1/include/mangle.h
Examining data/util-linux-2.36.1/include/closestream.h
Examining data/util-linux-2.36.1/include/mbsalign.h
Examining data/util-linux-2.36.1/include/crc32c.h
Examining data/util-linux-2.36.1/include/blkdev.h
Examining data/util-linux-2.36.1/include/carefulputc.h
Examining data/util-linux-2.36.1/include/sysfs.h
Examining data/util-linux-2.36.1/include/pt-mbr-partnames.h
Examining data/util-linux-2.36.1/include/cpuset.h
Examining data/util-linux-2.36.1/include/strutils.h
Examining data/util-linux-2.36.1/include/pt-gpt-partnames.h
Examining data/util-linux-2.36.1/include/list.h
Examining data/util-linux-2.36.1/include/signames.h
Examining data/util-linux-2.36.1/include/setproctitle.h
Examining data/util-linux-2.36.1/include/pt-sgi.h
Examining data/util-linux-2.36.1/login-utils/selinux_utils.h
Examining data/util-linux-2.36.1/login-utils/setpwnam.c
Examining data/util-linux-2.36.1/login-utils/last.c
Examining data/util-linux-2.36.1/login-utils/islocal.c
Examining data/util-linux-2.36.1/login-utils/selinux_utils.c
Examining data/util-linux-2.36.1/login-utils/auth.h
Examining data/util-linux-2.36.1/login-utils/newgrp.c
Examining data/util-linux-2.36.1/login-utils/sulogin-consoles.h
Examining data/util-linux-2.36.1/login-utils/sulogin-consoles.c
Examining data/util-linux-2.36.1/login-utils/vipw.c
Examining data/util-linux-2.36.1/login-utils/sulogin.c
Examining data/util-linux-2.36.1/login-utils/islocal.h
Examining data/util-linux-2.36.1/login-utils/su.c
Examining data/util-linux-2.36.1/login-utils/utmpdump.c
Examining data/util-linux-2.36.1/login-utils/setpwnam.h
Examining data/util-linux-2.36.1/login-utils/su-common.h
Examining data/util-linux-2.36.1/login-utils/nologin.c
Examining data/util-linux-2.36.1/login-utils/ch-common.h
Examining data/util-linux-2.36.1/login-utils/chsh.c
Examining data/util-linux-2.36.1/login-utils/libuser.c
Examining data/util-linux-2.36.1/login-utils/logindefs.c
Examining data/util-linux-2.36.1/login-utils/auth.c
Examining data/util-linux-2.36.1/login-utils/logindefs.h
Examining data/util-linux-2.36.1/login-utils/runuser.c
Examining data/util-linux-2.36.1/login-utils/login.c
Examining data/util-linux-2.36.1/login-utils/su-common.c
Examining data/util-linux-2.36.1/login-utils/libuser.h
Examining data/util-linux-2.36.1/login-utils/chfn.c
Examining data/util-linux-2.36.1/login-utils/lslogins.c
Examining data/util-linux-2.36.1/login-utils/ch-common.c
Examining data/util-linux-2.36.1/disk-utils/sfdisk.c
Examining data/util-linux-2.36.1/disk-utils/fdisk.h
Examining data/util-linux-2.36.1/disk-utils/mkfs.c
Examining data/util-linux-2.36.1/disk-utils/resizepart.c
Examining data/util-linux-2.36.1/disk-utils/fsck.c
Examining data/util-linux-2.36.1/disk-utils/blockdev.c
Examining data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c
Examining data/util-linux-2.36.1/disk-utils/fdisk.c
Examining data/util-linux-2.36.1/disk-utils/raw.c
Examining data/util-linux-2.36.1/disk-utils/cfdisk.c
Examining data/util-linux-2.36.1/disk-utils/partx.c
Examining data/util-linux-2.36.1/disk-utils/addpart.c
Examining data/util-linux-2.36.1/disk-utils/fsck.minix.c
Examining data/util-linux-2.36.1/disk-utils/mkfs.bfs.c
Examining data/util-linux-2.36.1/disk-utils/minix_programs.h
Examining data/util-linux-2.36.1/disk-utils/swaplabel.c
Examining data/util-linux-2.36.1/disk-utils/mkswap.c
Examining data/util-linux-2.36.1/disk-utils/fdformat.c
Examining data/util-linux-2.36.1/disk-utils/delpart.c
Examining data/util-linux-2.36.1/disk-utils/cramfs_common.c
Examining data/util-linux-2.36.1/disk-utils/cramfs.h
Examining data/util-linux-2.36.1/disk-utils/isosize.c
Examining data/util-linux-2.36.1/disk-utils/fdisk-list.h
Examining data/util-linux-2.36.1/disk-utils/fsck.cramfs.c
Examining data/util-linux-2.36.1/disk-utils/fdisk-menu.c
Examining data/util-linux-2.36.1/disk-utils/mkfs.minix.c
Examining data/util-linux-2.36.1/disk-utils/fdisk-list.c
Examining data/util-linux-2.36.1/tests/helpers/test_sysinfo.c
Examining data/util-linux-2.36.1/tests/helpers/test_mbsencode.c
Examining data/util-linux-2.36.1/tests/helpers/test_byteswap.c
Examining data/util-linux-2.36.1/tests/helpers/test_tiocsti.c
Examining data/util-linux-2.36.1/tests/helpers/test_sha1.c
Examining data/util-linux-2.36.1/tests/helpers/test_uuid_namespace.c
Examining data/util-linux-2.36.1/tests/helpers/test_strerror.c
Examining data/util-linux-2.36.1/tests/helpers/test_md5.c
Examining data/util-linux-2.36.1/tests/helpers/test_pathnames.c
Examining data/util-linux-2.36.1/tests/helpers/test_sigreceive.c
Examining data/util-linux-2.36.1/term-utils/script.c
Examining data/util-linux-2.36.1/term-utils/script-playutils.h
Examining data/util-linux-2.36.1/term-utils/setterm.c
Examining data/util-linux-2.36.1/term-utils/agetty.c
Examining data/util-linux-2.36.1/term-utils/ttymsg.h
Examining data/util-linux-2.36.1/term-utils/scriptlive.c
Examining data/util-linux-2.36.1/term-utils/mesg.c
Examining data/util-linux-2.36.1/term-utils/ttymsg.c
Examining data/util-linux-2.36.1/term-utils/scriptreplay.c
Examining data/util-linux-2.36.1/term-utils/wall.c
Examining data/util-linux-2.36.1/term-utils/write.c
Examining data/util-linux-2.36.1/term-utils/script-playutils.c
Examining data/util-linux-2.36.1/libfdisk/samples/mkpart-fullspec.c
Examining data/util-linux-2.36.1/libfdisk/samples/mkpart.c
Examining data/util-linux-2.36.1/libfdisk/src/script.c
Examining data/util-linux-2.36.1/libfdisk/src/gpt.c
Examining data/util-linux-2.36.1/libfdisk/src/dos.c
Examining data/util-linux-2.36.1/libfdisk/src/partition.c
Examining data/util-linux-2.36.1/libfdisk/src/sgi.c
Examining data/util-linux-2.36.1/libfdisk/src/bsd.c
Examining data/util-linux-2.36.1/libfdisk/src/field.c
Examining data/util-linux-2.36.1/libfdisk/src/version.c
Examining data/util-linux-2.36.1/libfdisk/src/label.c
Examining data/util-linux-2.36.1/libfdisk/src/table.c
Examining data/util-linux-2.36.1/libfdisk/src/item.c
Examining data/util-linux-2.36.1/libfdisk/src/context.c
Examining data/util-linux-2.36.1/libfdisk/src/ask.c
Examining data/util-linux-2.36.1/libfdisk/src/init.c
Examining data/util-linux-2.36.1/libfdisk/src/iter.c
Examining data/util-linux-2.36.1/libfdisk/src/alignment.c
Examining data/util-linux-2.36.1/libfdisk/src/utils.c
Examining data/util-linux-2.36.1/libfdisk/src/fdiskP.h
Examining data/util-linux-2.36.1/libfdisk/src/parttype.c
Examining data/util-linux-2.36.1/libfdisk/src/test.c
Examining data/util-linux-2.36.1/libfdisk/src/sun.c
Examining data/util-linux-2.36.1/libfdisk/src/wipe.c
Examining data/util-linux-2.36.1/libmount/src/lock.c
Examining data/util-linux-2.36.1/libmount/src/cache.c
Examining data/util-linux-2.36.1/libmount/src/tab_diff.c
Examining data/util-linux-2.36.1/libmount/src/context_loopdev.c
Examining data/util-linux-2.36.1/libmount/src/tab_parse.c
Examining data/util-linux-2.36.1/libmount/src/btrfs.c
Examining data/util-linux-2.36.1/libmount/src/tab.c
Examining data/util-linux-2.36.1/libmount/src/fs.c
Examining data/util-linux-2.36.1/libmount/src/tab_update.c
Examining data/util-linux-2.36.1/libmount/src/version.c
Examining data/util-linux-2.36.1/libmount/src/context.c
Examining data/util-linux-2.36.1/libmount/src/context_veritydev.c
Examining data/util-linux-2.36.1/libmount/src/init.c
Examining data/util-linux-2.36.1/libmount/src/mountP.h
Examining data/util-linux-2.36.1/libmount/src/iter.c
Examining data/util-linux-2.36.1/libmount/src/utils.c
Examining data/util-linux-2.36.1/libmount/src/context_umount.c
Examining data/util-linux-2.36.1/libmount/src/optstr.c
Examining data/util-linux-2.36.1/libmount/src/monitor.c
Examining data/util-linux-2.36.1/libmount/src/test.c
Examining data/util-linux-2.36.1/libmount/src/optmap.c
Examining data/util-linux-2.36.1/libmount/src/context_mount.c
Examining data/util-linux-2.36.1/libmount/python/tab.c
Examining data/util-linux-2.36.1/libmount/python/fs.c
Examining data/util-linux-2.36.1/libmount/python/pylibmount.h
Examining data/util-linux-2.36.1/libmount/python/context.c
Examining data/util-linux-2.36.1/libmount/python/pylibmount.c
Examining data/util-linux-2.36.1/Documentation/boilerplate.c
Examining data/util-linux-2.36.1/schedutils/taskset.c
Examining data/util-linux-2.36.1/schedutils/chrt.c
Examining data/util-linux-2.36.1/schedutils/ionice.c

FINAL RESULTS:

data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:375:16:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
#define lchown chown
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:431:42:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (((S_ISUID | S_ISGID) & i->mode) && chmod(path, i->mode) < 0)
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:161:7:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		if (readlink(path, start, size) < 0) {
data/util-linux-2.36.1/lib/path.c:550:10:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		return readlink(p, buf, bufsiz);
data/util-linux-2.36.1/lib/sysfs.c:361:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		sz = readlink(chain, buf, bufsz - 1);
data/util-linux-2.36.1/lib/sysfs.c:818:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	len = readlink(path, linkc, sizeof(linkc) - 1);
data/util-linux-2.36.1/login-utils/login.c:418:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		if (chown(cxt->vcsn, uid, gid))			/* vcs */
data/util-linux-2.36.1/login-utils/login.c:420:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (chmod(cxt->vcsn, cxt->tty_mode))
data/util-linux-2.36.1/login-utils/login.c:423:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		if (chown(cxt->vcsan, uid, gid))		/* vcsa */
data/util-linux-2.36.1/login-utils/login.c:425:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (chmod(cxt->vcsan, cxt->tty_mode))
data/util-linux-2.36.1/misc-utils/namei.c:88:7:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	sz = readlink(path, sym, sizeof(sym));
data/util-linux-2.36.1/misc-utils/rename.c:128:6:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	if (readlink(s, target, sb.st_size + 1) < 0) {
data/util-linux-2.36.1/Documentation/boilerplate.c:58:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25)); /* char offset to align option descriptions */
data/util-linux-2.36.1/Documentation/boilerplate.c:59:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fixme-command-name(1)"));
data/util-linux-2.36.1/disk-utils/addpart.c:22:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/disk-utils/addpart.c:23:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("addpart(8)"));
data/util-linux-2.36.1/disk-utils/blockdev.c:200:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/disk-utils/blockdev.c:215:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("blockdev(8)"));
data/util-linux-2.36.1/disk-utils/blockdev.c:444:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(device, "/dev/%s", ptname);
data/util-linux-2.36.1/disk-utils/blockdev.c:481:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(start_str, "%10s", _("N/A"));
data/util-linux-2.36.1/disk-utils/cfdisk.c:718:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, fmt, ap);
data/util-linux-2.36.1/disk-utils/cfdisk.c:737:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, fmt_m, ap);
data/util-linux-2.36.1/disk-utils/cfdisk.c:757:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, ap);
data/util-linux-2.36.1/disk-utils/cfdisk.c:771:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, ap);
data/util-linux-2.36.1/disk-utils/cfdisk.c:787:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stdout, fmt, ap);
data/util-linux-2.36.1/disk-utils/cfdisk.c:806:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stdout, fmt, ap);
data/util-linux-2.36.1/disk-utils/cfdisk.c:2672:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/disk-utils/cfdisk.c:2674:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("cfdisk(8)"));
data/util-linux-2.36.1/disk-utils/cfdisk.c:2745:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (access(default_disks[i], F_OK) == 0) {
data/util-linux-2.36.1/disk-utils/delpart.c:22:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/disk-utils/delpart.c:23:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("delpart(8)"));
data/util-linux-2.36.1/disk-utils/fdformat.c:160:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(19));
data/util-linux-2.36.1/disk-utils/fdformat.c:161:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fdformat(8)"));
data/util-linux-2.36.1/disk-utils/fdisk-list.c:442:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(out, USAGE_COLUMNS);
data/util-linux-2.36.1/disk-utils/fdisk.c:889:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(31));
data/util-linux-2.36.1/disk-utils/fdisk.c:893:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fdisk(8)"));
data/util-linux-2.36.1/disk-utils/fsck.c:352:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(FSCK_RUNTIME_DIRNAME, F_OK) != 0) {
data/util-linux-2.36.1/disk-utils/fsck.c:500:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(path, F_OK) == 0) {
data/util-linux-2.36.1/disk-utils/fsck.c:554:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(prog, X_OK) == 0)
data/util-linux-2.36.1/disk-utils/fsck.c:691:3:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execv(progpath, argv);
data/util-linux-2.36.1/disk-utils/fsck.c:1412:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fsck(8)"));
data/util-linux-2.36.1/disk-utils/fsck.c:1465:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				if (access(_PATH_PROC_PARTITIONS, R_OK) < 0) {
data/util-linux-2.36.1/disk-utils/fsck.c:1629:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(UTIL_LINUX_VERSION);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:123:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:125:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fsck.cramfs(8)"));
data/util-linux-2.36.1/disk-utils/fsck.minix.c:195:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(18));
data/util-linux-2.36.1/disk-utils/fsck.minix.c:196:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fsck.minix(8)"));
data/util-linux-2.36.1/disk-utils/fsck.minix.c:207:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, UTIL_LINUX_VERSION);
data/util-linux-2.36.1/disk-utils/fsck.minix.c:209:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, ap);
data/util-linux-2.36.1/disk-utils/fsck.minix.c:252:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(def ? _("%s (y/n)? ") : _("%s (n/y)? "), string);
data/util-linux-2.36.1/disk-utils/isosize.c:109:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/disk-utils/isosize.c:110:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("isosize(8)"));
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:88:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(21));
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:90:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mkfs.bfs(8)"));
data/util-linux-2.36.1/disk-utils/mkfs.c:58:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(20));
data/util-linux-2.36.1/disk-utils/mkfs.c:60:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mkfs(8)"));
data/util-linux-2.36.1/disk-utils/mkfs.c:122:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(UTIL_LINUX_VERSION);
data/util-linux-2.36.1/disk-utils/mkfs.c:132:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(progname, argv + optind);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:146:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:147:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mkfs.cramfs(8)"));
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:148:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:149:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mkfs.minix(8)"));
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:566:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(P_("%lu inode\n", "%lu inodes\n", inodes), inodes);
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:567:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(P_("%lu block\n", "%lu blocks\n", zones), zones);
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:641:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(P_("%d bad block\n", "%d bad blocks\n", ctl->fs_bad_blocks), ctl->fs_bad_blocks);
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:665:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(P_("%d bad block\n", "%d bad blocks\n", ctl->fs_bad_blocks), ctl->fs_bad_blocks);
data/util-linux-2.36.1/disk-utils/mkswap.c:167:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(27));
data/util-linux-2.36.1/disk-utils/mkswap.c:169:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mkswap(8)"));
data/util-linux-2.36.1/disk-utils/mkswap.c:208:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(P_("%lu bad page\n", "%lu bad pages\n", ctl->nbadpages), ctl->nbadpages);
data/util-linux-2.36.1/disk-utils/partx.c:229:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(path, sizeof(path), _PATH_SYS_DEVBLOCK "/%d:%d/",
data/util-linux-2.36.1/disk-utils/partx.c:564:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(P_("#%2d: %9ju-%9ju (%9ju sector, %6ju MB)\n",
data/util-linux-2.36.1/disk-utils/partx.c:779:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/disk-utils/partx.c:785:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("partx(8)"));
data/util-linux-2.36.1/disk-utils/raw.c:62:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/disk-utils/raw.c:63:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("raw(8)"));
data/util-linux-2.36.1/disk-utils/raw.c:159:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	rc = sscanf(raw_name, _PATH_RAWDEVDIR "raw%d", &raw_minor);
data/util-linux-2.36.1/disk-utils/resizepart.c:27:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/disk-utils/resizepart.c:28:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("resizepart(8)"));
data/util-linux-2.36.1/disk-utils/sfdisk.c:2082:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("sfdisk(8)"));
data/util-linux-2.36.1/disk-utils/swaplabel.c:133:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(21));
data/util-linux-2.36.1/disk-utils/swaplabel.c:134:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("swaplabel(8)"));
data/util-linux-2.36.1/include/c.h:212:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stderr, fmt, argp);
data/util-linux-2.36.1/include/c.h:376:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(UTIL_LINUX_VERSION); \
data/util-linux-2.36.1/include/debug.h:117:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, mesg, ap);
data/util-linux-2.36.1/include/debugobj.h:17:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, mesg, ap);
data/util-linux-2.36.1/include/xalloc.h:97:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((__format__(printf, 2, 3)))
data/util-linux-2.36.1/include/xalloc.h:112:27:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
__attribute__((__format__(printf, 2, 0)))
data/util-linux-2.36.1/lib/canonicalize.c:48:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(path, sizeof(path), _PATH_DEV_MAPPER "/%s", name);
data/util-linux-2.36.1/lib/canonicalize.c:50:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if ((prefix && *prefix) || access(path, F_OK) == 0)
data/util-linux-2.36.1/lib/colors.c:341:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(buf, bufsz, "%s/" _PATH_TERMCOLORS_DIRNAME, p);
data/util-linux-2.36.1/lib/colors.c:347:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(buf, bufsz, "%s/.config/" _PATH_TERMCOLORS_DIRNAME, p);
data/util-linux-2.36.1/lib/env.c:120:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(copy, *bad);
data/util-linux-2.36.1/lib/env.c:128:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(copy, *bad);
data/util-linux-2.36.1/lib/exec_shell.c:47:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(arg0 + 1, shell_basename);
data/util-linux-2.36.1/lib/exec_shell.c:49:2:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execl(shell, arg0, (char *)NULL);
data/util-linux-2.36.1/lib/ismounted.c:195:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access("/proc/mounts", R_OK) == 0) {
data/util-linux-2.36.1/lib/pager.c:84:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(cmd->argv[0], (char *const*) cmd->argv);
data/util-linux-2.36.1/lib/pager.c:184:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		rc = access(cmd, X_OK) == 0;
data/util-linux-2.36.1/lib/path.c:209:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return access(path, F_OK) == 0;
data/util-linux-2.36.1/lib/path.c:252:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	rc = vsnprintf(pc->path_buffer, sizeof(pc->path_buffer), path, ap);
data/util-linux-2.36.1/lib/path.c:309:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		rc = access(path, mode);
data/util-linux-2.36.1/lib/path.c:699:7:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	rc = vfscanf(f, fmt, fmt_ap);
data/util-linux-2.36.1/lib/path.c:717:7:  [4] (buffer) vfscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	rc = vfscanf(f, fmt, fmt_ap);
data/util-linux-2.36.1/lib/path.c:887:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = snprintf(buf, sizeof(buf), "%" PRId64, num);
data/util-linux-2.36.1/lib/path.c:909:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = snprintf(buf, sizeof(buf), "%" PRIu64, num);
data/util-linux-2.36.1/lib/pty-session.c:691:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl(shell, shname, "-c", command, (char *)NULL);
data/util-linux-2.36.1/lib/pty-session.c:693:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl(shell, shname, "-i", (char *)NULL);
data/util-linux-2.36.1/lib/pwdutils.c:109:9:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
	user = getlogin();
data/util-linux-2.36.1/lib/randutils.c:198:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(random_sources[i], R_OK))
data/util-linux-2.36.1/lib/setproctitle.c:64:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s -- %s", prog, txt);
data/util-linux-2.36.1/lib/setproctitle.c:72:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(argv0[0], buf);
data/util-linux-2.36.1/lib/strutils.c:646:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		len = snprintf(buf, sizeof(buf), "%d%s%02" PRIu64, dec, dp, frac);
data/util-linux-2.36.1/lib/sysfs.c:80:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buf, sizeof(buf), _PATH_SYS_DEVBLOCK "/%d:%d", major(devno), minor(devno));
data/util-linux-2.36.1/libblkid/src/dev.c:165:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(new_type, search_type);
data/util-linux-2.36.1/libblkid/src/dev.c:166:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(new_value, search_value);
data/util-linux-2.36.1/libblkid/src/devname.c:89:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(devname, F_OK) < 0)
data/util-linux-2.36.1/libblkid/src/devname.c:166:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "/sys/block/%s/slaves", de->d_name);
data/util-linux-2.36.1/libblkid/src/devname.c:199:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (only_if_new && !access(tmp->bid_name, F_OK))
data/util-linux-2.36.1/libblkid/src/devname.c:330:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(vdirname, "%s/%s/LVs", VG_DIR, vg_name);
data/util-linux-2.36.1/libblkid/src/devname.c:350:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(lvm_device, "%s/%s/LVs/%s", VG_DIR, vg_name,
data/util-linux-2.36.1/libblkid/src/devname.c:353:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(lvm_device, "%s/%s", vg_name, lv_name);
data/util-linux-2.36.1/libblkid/src/devno.c:346:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(stderr, errmsg, "device number", argv[1]);
data/util-linux-2.36.1/libblkid/src/devno.c:352:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(stderr, errmsg, "major number", argv[1]);
data/util-linux-2.36.1/libblkid/src/devno.c:357:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(stderr, errmsg, "minor number", argv[2]);
data/util-linux-2.36.1/libblkid/src/evaluate.c:148:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dev, _PATH_DEV_BYUUID "/");
data/util-linux-2.36.1/libblkid/src/evaluate.c:150:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dev, _PATH_DEV_BYLABEL "/");
data/util-linux-2.36.1/libblkid/src/evaluate.c:152:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dev, _PATH_DEV_BYPARTLABEL "/");
data/util-linux-2.36.1/libblkid/src/evaluate.c:154:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dev, _PATH_DEV_BYPARTUUID "/");
data/util-linux-2.36.1/libblkid/src/evaluate.c:156:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dev, _PATH_DEV_BYID "/");
data/util-linux-2.36.1/libblkid/src/save.c:118:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    (ret == 0 && access(filename, W_OK) < 0)) {
data/util-linux-2.36.1/libblkid/src/save.c:133:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s-XXXXXX", filename);
data/util-linux-2.36.1/libblkid/src/save.c:184:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(backup, "%s.old", filename);
data/util-linux-2.36.1/libblkid/src/tag.c:350:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			    !access(tmp->bit_dev->bid_name, F_OK)) {
data/util-linux-2.36.1/libblkid/src/topology/dm.c:93:3:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execv(dmargv[0], (char * const *) dmargv);
data/util-linux-2.36.1/libblkid/src/topology/lvm.c:95:3:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execv(lvargv[0], lvargv);
data/util-linux-2.36.1/libfdisk/src/script.c:490:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(buf, sizeof(buf), "%"PRIu64, item.data.num64);
data/util-linux-2.36.1/libfdisk/src/script.c:498:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(buf, sizeof(buf), "%"PRIu64, item.data.num64);
data/util-linux-2.36.1/libfdisk/src/utils.c:160:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (res && access(res, F_OK) == 0)
data/util-linux-2.36.1/libfdisk/src/utils.c:168:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (res && access(res, F_OK) == 0)
data/util-linux-2.36.1/libmount/python/pylibmount.h:35:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, mesg, ap);
data/util-linux-2.36.1/libmount/python/pylibmount.h:48:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, mesg, ap);
data/util-linux-2.36.1/libmount/src/context.c:2003:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(dev, F_OK) == 0) {
data/util-linux-2.36.1/libmount/src/context.c:2690:22:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	if (buf && bufsz && vsnprintf(buf, bufsz, fmt, va) < 0)
data/util-linux-2.36.1/libmount/src/context_mount.c:317:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access("/sys/fs/smackfs", F_OK) != 0)
data/util-linux-2.36.1/libmount/src/context_mount.c:690:3:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execv(cxt->helper, (char * const *) args);
data/util-linux-2.36.1/libmount/src/context_mount.c:1689:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(buf, bufsz, restricted ?
data/util-linux-2.36.1/libmount/src/context_mount.c:1705:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(buf, bufsz, errno ?
data/util-linux-2.36.1/libmount/src/context_umount.c:733:3:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execv(cxt->helper, (char * const *) args);
data/util-linux-2.36.1/libmount/src/context_veritydev.c:126:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(mapper_device, backing_file_basename);
data/util-linux-2.36.1/libmount/src/context_veritydev.c:376:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(mapper_device_full, mapper_device);
data/util-linux-2.36.1/libmount/src/utils.c:216:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path, W_OK) == 0)
data/util-linux-2.36.1/libsmartcols/src/buffer.c:127:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buf->encdata, data);
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:539:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return (access("/dev/random", R_OK) == 0 ||
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:540:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		access("/dev/urandom", R_OK) == 0);
data/util-linux-2.36.1/login-utils/chfn.c:109:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("chfn(1)"));
data/util-linux-2.36.1/login-utils/chsh.c:86:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("chsh(1)"));
data/util-linux-2.36.1/login-utils/chsh.c:232:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(shell, F_OK) < 0)
data/util-linux-2.36.1/login-utils/chsh.c:234:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(shell, X_OK) < 0)
data/util-linux-2.36.1/login-utils/last.c:597:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/login-utils/last.c:598:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("last(1)"));
data/util-linux-2.36.1/login-utils/last.c:616:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(path, R_OK) == 0) {
data/util-linux-2.36.1/login-utils/last.c:777:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(ut.ut_line,
data/util-linux-2.36.1/login-utils/login.c:454:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(cxt->tty_path, R_OK | W_OK) != 0) {
data/util-linux-2.36.1/login-utils/login.c:1186:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("login(1)"));
data/util-linux-2.36.1/login-utils/login.c:1444:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(childArgv[0], childArgv + 1);
data/util-linux-2.36.1/login-utils/logindefs.c:524:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "%s/%s", pwd->pw_dir, file);
data/util-linux-2.36.1/login-utils/lslogins.c:855:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				user->nologin = access(_PATH_NOLOGIN, F_OK) == 0 ||
data/util-linux-2.36.1/login-utils/lslogins.c:856:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
						access(_PATH_VAR_NOLOGIN, F_OK) == 0;
data/util-linux-2.36.1/login-utils/lslogins.c:1408:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/login-utils/lslogins.c:1414:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("lslogins(1)"));
data/util-linux-2.36.1/login-utils/newgrp.c:151:16:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
		char *cbuf = crypt(xpwd, pwd);
data/util-linux-2.36.1/login-utils/newgrp.c:179:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/login-utils/newgrp.c:180:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("newgrp(1)"));
data/util-linux-2.36.1/login-utils/newgrp.c:237:2:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execl(shell, shell, (char *)NULL);
data/util-linux-2.36.1/login-utils/nologin.c:34:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/login-utils/nologin.c:36:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("nologin(8)"));
data/util-linux-2.36.1/login-utils/su-common.c:806:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(arg0 + 1, shell_basename);
data/util-linux-2.36.1/login-utils/su-common.c:820:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(shell, (char **)args);
data/util-linux-2.36.1/login-utils/su-common.c:863:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(33));
data/util-linux-2.36.1/login-utils/su-common.c:884:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout, USAGE_MAN_TAIL("runuser(1)"));
data/util-linux-2.36.1/login-utils/su-common.c:901:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout, USAGE_MAN_TAIL("su(1)"));
data/util-linux-2.36.1/login-utils/su-common.c:1213:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(argv[optind], &argv[optind]);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:82:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, mesg, ap);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:335:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tail->tty, name);
data/util-linux-2.36.1/login-utils/sulogin.c:753:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(shell, sizeof(shell), profile ? "-%s" : "%s", p);
data/util-linux-2.36.1/login-utils/sulogin.c:792:2:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execl(su_shell, shell, (char *)NULL);
data/util-linux-2.36.1/login-utils/sulogin.c:796:2:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execl("/bin/sh", profile ? "-sh" : "sh", (char *)NULL);
data/util-linux-2.36.1/login-utils/sulogin.c:817:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/login-utils/sulogin.c:818:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("sulogin(8)"));
data/util-linux-2.36.1/login-utils/sulogin.c:995:17:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
					cryptbuf = crypt(answer, passwd);
data/util-linux-2.36.1/login-utils/utmpdump.c:314:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/login-utils/utmpdump.c:316:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("utmpdump(1)"));
data/util-linux-2.36.1/login-utils/vipw.c:157:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s%s", orig_file, ".OLD");
data/util-linux-2.36.1/login-utils/vipw.c:211:3:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execlp(editor, p, tmp_file, (char *)NULL);
data/util-linux-2.36.1/login-utils/vipw.c:311:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/login-utils/vipw.c:312:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("vipw(8)"));
data/util-linux-2.36.1/login-utils/vipw.c:356:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(orig_file, F_OK) == 0) {
data/util-linux-2.36.1/misc-utils/blkid.c:100:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(28));
data/util-linux-2.36.1/misc-utils/blkid.c:103:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<size> and <offset>")));
data/util-linux-2.36.1/misc-utils/blkid.c:107:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("blkid(8)"));
data/util-linux-2.36.1/misc-utils/blkid.c:214:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(devname, F_OK))
data/util-linux-2.36.1/misc-utils/cal.c:1310:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(23));
data/util-linux-2.36.1/misc-utils/cal.c:1311:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("cal(1)"));
data/util-linux-2.36.1/misc-utils/fincore.c:272:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(23));
data/util-linux-2.36.1/misc-utils/fincore.c:274:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(out, USAGE_COLUMNS);
data/util-linux-2.36.1/misc-utils/fincore.c:279:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fincore(1)"));
data/util-linux-2.36.1/misc-utils/findfs.c:35:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/misc-utils/findfs.c:36:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("findfs(8)"));
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:43:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stdout, fmt, ap);
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:519:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, P_("%d parse error", "%d parse errors", parse_nerrors), parse_nerrors);
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:520:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, P_(", %d error",     ", %d errors", vfy.nerrors), vfy.nerrors);
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:521:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, P_(", %d warning",   ", %d warnings", vfy.nwarnings), vfy.nwarnings);
data/util-linux-2.36.1/misc-utils/findmnt.c:841:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				path = access(_PATH_PROC_MOUNTINFO, R_OK) == 0 ?
data/util-linux-2.36.1/misc-utils/findmnt.c:871:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	path = access(_PATH_PROC_MOUNTINFO, R_OK) == 0 ?
data/util-linux-2.36.1/misc-utils/findmnt.c:1267:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/misc-utils/findmnt.c:1273:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("findmnt(8)"));
data/util-linux-2.36.1/misc-utils/getopt.c:349:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(31));
data/util-linux-2.36.1/misc-utils/getopt.c:350:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("getopt(1)"));
data/util-linux-2.36.1/misc-utils/getopt.c:405:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(ctl.optstr, argv[1] + strspn(argv[1], "-+"));
data/util-linux-2.36.1/misc-utils/hardlink.c:156:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16)); /* char offset to align option descriptions */
data/util-linux-2.36.1/misc-utils/hardlink.c:157:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("hardlink(1)"));
data/util-linux-2.36.1/misc-utils/kill.c:215:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/misc-utils/kill.c:216:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("kill(1)"));
data/util-linux-2.36.1/misc-utils/logger.c:249:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s_addr.sun_path, path);
data/util-linux-2.36.1/misc-utils/logger.c:401:13:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
	if (!(cp = getlogin()) || !*cp)
data/util-linux-2.36.1/misc-utils/logger.c:1088:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/misc-utils/logger.c:1089:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("logger(1)"));
data/util-linux-2.36.1/misc-utils/look.c:107:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ((file = getenv("WORDLIST")) && !access(file, R_OK))
data/util-linux-2.36.1/misc-utils/look.c:371:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/misc-utils/look.c:372:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("look(1)"));
data/util-linux-2.36.1/misc-utils/lsblk-mnt.c:37:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(buf, sizeof(buf), "%s" _PATH_PROC_SWAPS, lsblk->sysroot);
data/util-linux-2.36.1/misc-utils/lsblk-mnt.c:70:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(buf, sizeof(buf), "%s" _PATH_PROC_MOUNTINFO, lsblk->sysroot);
data/util-linux-2.36.1/misc-utils/lsblk.c:1796:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/misc-utils/lsblk.c:1798:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(out, USAGE_COLUMNS);
data/util-linux-2.36.1/misc-utils/lsblk.c:1803:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("lsblk(8)"));
data/util-linux-2.36.1/misc-utils/lsblk.c:1810:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(_PATH_SYS_DEVBLOCK, R_OK) != 0)
data/util-linux-2.36.1/misc-utils/lslocks.c:545:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/misc-utils/lslocks.c:552:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("lslocks(8)"));
data/util-linux-2.36.1/misc-utils/mcookie.c:94:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(23));
data/util-linux-2.36.1/misc-utils/mcookie.c:97:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<num>")));
data/util-linux-2.36.1/misc-utils/mcookie.c:99:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mcookie(1)"));
data/util-linux-2.36.1/misc-utils/mcookie.c:123:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				fprintf(stderr,
data/util-linux-2.36.1/misc-utils/mcookie.c:190:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, P_("Got %d byte from %s\n",
data/util-linux-2.36.1/misc-utils/namei.c:347:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(21));
data/util-linux-2.36.1/misc-utils/namei.c:349:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("namei(1)"));
data/util-linux-2.36.1/misc-utils/rename.c:192:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ((nooverwrite || interactive) && access(newname, F_OK) != 0)
data/util-linux-2.36.1/misc-utils/rename.c:228:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(21));
data/util-linux-2.36.1/misc-utils/rename.c:229:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("rename(1)"));
data/util-linux-2.36.1/misc-utils/test_uuidd.c:41:48:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define LOG(level,args) if (loglev >= level) { fprintf args; }
data/util-linux-2.36.1/misc-utils/test_uuidd.c:292:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(stderr, MSG_TRY_HELP);
data/util-linux-2.36.1/misc-utils/uuidd.c:79:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/misc-utils/uuidd.c:80:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("uuidd(8)"));
data/util-linux-2.36.1/misc-utils/uuidd.c:485:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				fprintf(stderr, P_("Generated time UUID %s "
data/util-linux-2.36.1/misc-utils/uuidd.c:506:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				fprintf(stderr, P_("Generated %d UUID:\n",
data/util-linux-2.36.1/misc-utils/uuidd.c:665:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(P_("%s and %d subsequent UUID\n",
data/util-linux-2.36.1/misc-utils/uuidgen.c:40:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(18));
data/util-linux-2.36.1/misc-utils/uuidgen.c:41:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("uuidgen(1)"));
data/util-linux-2.36.1/misc-utils/uuidparse.c:104:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/misc-utils/uuidparse.c:110:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("uuidparse(1)"));
data/util-linux-2.36.1/misc-utils/whereis.c:216:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/misc-utils/whereis.c:217:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("whereis(1)"));
data/util-linux-2.36.1/misc-utils/whereis.c:226:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(dir, R_OK) != 0)
data/util-linux-2.36.1/misc-utils/wipefs.c:477:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(P_("%s: %zd byte was erased at offset 0x%08jx (%s): ",
data/util-linux-2.36.1/misc-utils/wipefs.c:668:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(21));
data/util-linux-2.36.1/misc-utils/wipefs.c:671:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<num>")));
data/util-linux-2.36.1/misc-utils/wipefs.c:677:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("wipefs(8)"));
data/util-linux-2.36.1/schedutils/chrt.c:168:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/schedutils/chrt.c:170:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("chrt(1)"));
data/util-linux-2.36.1/schedutils/chrt.c:565:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argv[0], argv);
data/util-linux-2.36.1/schedutils/ionice.c:124:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/schedutils/ionice.c:126:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("ionice(1)"));
data/util-linux-2.36.1/schedutils/ionice.c:259:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argv[optind], &argv[optind]);
data/util-linux-2.36.1/schedutils/taskset.c:65:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/schedutils/taskset.c:81:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("taskset(1)"));
data/util-linux-2.36.1/schedutils/taskset.c:102:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(msg, ts->pid ? ts->pid : getpid(), str);
data/util-linux-2.36.1/schedutils/taskset.c:246:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argv[0], argv);
data/util-linux-2.36.1/sys-utils/blkdiscard.c:101:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(21));
data/util-linux-2.36.1/sys-utils/blkdiscard.c:104:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<num>")));
data/util-linux-2.36.1/sys-utils/blkdiscard.c:106:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("blkdiscard(8)"));
data/util-linux-2.36.1/sys-utils/blkzone.c:345:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(_("%s: successful %s of zones in range from %" PRIu64 ", to %" PRIu64),
data/util-linux-2.36.1/sys-utils/blkzone.c:376:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/blkzone.c:379:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<sector> and <sectors>")));
data/util-linux-2.36.1/sys-utils/blkzone.c:381:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("blkzone(8)"));
data/util-linux-2.36.1/sys-utils/chcpu.c:256:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(31));
data/util-linux-2.36.1/sys-utils/chcpu.c:258:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("chcpu(8)"));
data/util-linux-2.36.1/sys-utils/chmem.c:344:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(20));
data/util-linux-2.36.1/sys-utils/chmem.c:350:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("chmem(8)"));
data/util-linux-2.36.1/sys-utils/choom.c:50:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/choom.c:51:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("choom(1)"));
data/util-linux-2.36.1/sys-utils/choom.c:153:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argv[0], argv);
data/util-linux-2.36.1/sys-utils/ctrlaltdel.c:34:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/sys-utils/ctrlaltdel.c:35:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("ctrlaltdel(8)"));
data/util-linux-2.36.1/sys-utils/dmesg.c:307:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(29));
data/util-linux-2.36.1/sys-utils/dmesg.c:320:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("dmesg(1)"));
data/util-linux-2.36.1/sys-utils/eject.c:109:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(fmt, va);
data/util-linux-2.36.1/sys-utils/eject.c:165:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(29));
data/util-linux-2.36.1/sys-utils/eject.c:168:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("eject(1)"));
data/util-linux-2.36.1/sys-utils/eject.c:299:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ((*name == '.' || *name == '/') && access(name, F_OK) == 0)
data/util-linux-2.36.1/sys-utils/eject.c:305:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(buf, F_OK) == 0)
data/util-linux-2.36.1/sys-utils/eject.c:666:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl("/bin/umount", "/bin/umount", name, "-n", (char *)NULL);
data/util-linux-2.36.1/sys-utils/eject.c:668:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl("/bin/umount", "/bin/umount", name, (char *)NULL);
data/util-linux-2.36.1/sys-utils/fallocate.c:104:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/sys-utils/fallocate.c:107:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<num>")));
data/util-linux-2.36.1/sys-utils/fallocate.c:109:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fallocate(1)"));
data/util-linux-2.36.1/sys-utils/flock.c:73:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/sys-utils/flock.c:74:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("flock(1)"));
data/util-linux-2.36.1/sys-utils/flock.c:121:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(cmd_argv[0], cmd_argv);
data/util-linux-2.36.1/sys-utils/flock.c:306:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			    access(filename, R_OK | W_OK) == 0) {
data/util-linux-2.36.1/sys-utils/fsfreeze.c:50:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(19));
data/util-linux-2.36.1/sys-utils/fsfreeze.c:51:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fsfreeze(8)"));
data/util-linux-2.36.1/sys-utils/fstrim.c:339:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(tgt, W_OK) != 0) {
data/util-linux-2.36.1/sys-utils/fstrim.c:431:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(21));
data/util-linux-2.36.1/sys-utils/fstrim.c:434:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<num>")));
data/util-linux-2.36.1/sys-utils/fstrim.c:436:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("fstrim(8)"));
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:977:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:3262:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (tz1buf, "XXX%s%jd:%02d",
data/util-linux-2.36.1/sys-utils/hwclock.c:230:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(ctl->adj_file_name, R_OK) != 0)
data/util-linux-2.36.1/sys-utils/hwclock.c:866:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(P_("Time since last adjustment is %ld second\n",
data/util-linux-2.36.1/sys-utils/hwclock.c:1146:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(UTIL_LINUX_VERSION);
data/util-linux-2.36.1/sys-utils/hwclock.c:1193:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/sys-utils/hwclock.c:1194:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("hwclock(8)"));
data/util-linux-2.36.1/sys-utils/ipcmk.c:79:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/sys-utils/ipcmk.c:82:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<size>")));
data/util-linux-2.36.1/sys-utils/ipcmk.c:84:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("ipcmk(1)"));
data/util-linux-2.36.1/sys-utils/ipcrm.c:68:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(28));
data/util-linux-2.36.1/sys-utils/ipcrm.c:69:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("ipcrm(1)"));
data/util-linux-2.36.1/sys-utils/ipcs.c:68:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/sys-utils/ipcs.c:86:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("ipcs(1)"));
data/util-linux-2.36.1/sys-utils/ipcutils.c:21:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(_PATH_PROC_IPC_MSGMNI, F_OK) == 0 &&
data/util-linux-2.36.1/sys-utils/ipcutils.c:22:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(_PATH_PROC_IPC_MSGMNB, F_OK) == 0 &&
data/util-linux-2.36.1/sys-utils/ipcutils.c:23:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(_PATH_PROC_IPC_MSGMAX, F_OK) == 0) {
data/util-linux-2.36.1/sys-utils/ipcutils.c:77:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(_PATH_PROC_IPC_SHMALL, F_OK) == 0 &&
data/util-linux-2.36.1/sys-utils/ipcutils.c:78:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(_PATH_PROC_IPC_SHMMAX, F_OK) == 0 &&
data/util-linux-2.36.1/sys-utils/ipcutils.c:79:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    access(_PATH_PROC_IPC_SHMMNI, F_OK) == 0) {
data/util-linux-2.36.1/sys-utils/ipcutils.c:515:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(format, size);
data/util-linux-2.36.1/sys-utils/ipcutils.c:519:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(format, size / 1024);
data/util-linux-2.36.1/sys-utils/ipcutils.c:525:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(format, (tmp = size_to_human_string(SIZE_SUFFIX_1LETTER, size)));
data/util-linux-2.36.1/sys-utils/irqtop.c:227:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/sys-utils/irqtop.c:239:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("irqtop(1)"));
data/util-linux-2.36.1/sys-utils/ldattach.c:145:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, args);
data/util-linux-2.36.1/sys-utils/ldattach.c:219:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/sys-utils/ldattach.c:228:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("ldattach(8)"));
data/util-linux-2.36.1/sys-utils/losetup.c:439:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(31));
data/util-linux-2.36.1/sys-utils/losetup.c:445:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("losetup(8)"));
data/util-linux-2.36.1/sys-utils/losetup.c:873:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (access(_PATH_DEV_LOOPCTL, F_OK) == 0 &&
data/util-linux-2.36.1/sys-utils/losetup.c:874:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			    access(_PATH_DEV_LOOPCTL, W_OK) != 0)
data/util-linux-2.36.1/sys-utils/lscpu.c:587:25:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (desc->arch && mod->system != SYSTEM_SNAPSHOT) {
data/util-linux-2.36.1/sys-utils/lscpu.c:928:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (mod->system != SYSTEM_SNAPSHOT) {
data/util-linux-2.36.1/sys-utils/lscpu.c:1945:40:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
static void __attribute__ ((__format__(printf, 3, 4)))
data/util-linux-2.36.1/sys-utils/lscpu.c:2241:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(buf, sizeof(buf), ("Vulnerability %s:"), desc->vuls[i].name);
data/util-linux-2.36.1/sys-utils/lscpu.c:2278:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/sys-utils/lscpu.c:2288:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("lscpu(1)"));
data/util-linux-2.36.1/sys-utils/lscpu.h:201:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int		system;		/* SYSTEM_* */
data/util-linux-2.36.1/sys-utils/lsipc.c:320:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/sys-utils/lsipc.c:342:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("lsipc(1)"));
data/util-linux-2.36.1/sys-utils/lsipc.c:1003:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						offt += sprintf(arg, "%s", _("dest"));
data/util-linux-2.36.1/sys-utils/lsipc.c:1011:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						offt += sprintf(arg + offt, "%s", _("locked"));
data/util-linux-2.36.1/sys-utils/lsipc.c:1018:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						offt += sprintf(arg + offt, "%s", _("hugetlb"));
data/util-linux-2.36.1/sys-utils/lsipc.c:1025:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(arg + offt, "%s", _("noreserve"));
data/util-linux-2.36.1/sys-utils/lsirq.c:69:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/sys-utils/lsirq.c:74:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("lsirq(1)"));
data/util-linux-2.36.1/sys-utils/lsmem.c:290:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
					strcat(valid_zones, zone_names[zone_id]);
data/util-linux-2.36.1/sys-utils/lsmem.c:525:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(22));
data/util-linux-2.36.1/sys-utils/lsmem.c:531:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("lsmem(1)"));
data/util-linux-2.36.1/sys-utils/lsns.c:917:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/lsns.c:923:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("lsns(8)"));
data/util-linux-2.36.1/sys-utils/mount.c:185:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(ignored == 1 ? _("%-25s: ignored\n") :
data/util-linux-2.36.1/sys-utils/mount.c:487:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/sys-utils/mount.c:520:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mount(8)"));
data/util-linux-2.36.1/sys-utils/mountpoint.c:131:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(20));
data/util-linux-2.36.1/sys-utils/mountpoint.c:132:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mountpoint(1)"));
data/util-linux-2.36.1/sys-utils/nsenter.c:102:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/nsenter.c:103:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("nsenter(1)"));
data/util-linux-2.36.1/sys-utils/nsenter.c:488:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argv[optind], argv + optind);
data/util-linux-2.36.1/sys-utils/pivot_root.c:41:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/sys-utils/pivot_root.c:42:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("pivot_root(8)"));
data/util-linux-2.36.1/sys-utils/prlimit.c:176:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/prlimit.c:201:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("prlimit(1)"));
data/util-linux-2.36.1/sys-utils/prlimit.c:642:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argv[optind], &argv[optind]);
data/util-linux-2.36.1/sys-utils/readprofile.c:71:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmdline, "zcat %s", name);
data/util-linux-2.36.1/sys-utils/readprofile.c:72:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		res = popen(cmdline, mode);
data/util-linux-2.36.1/sys-utils/readprofile.c:95:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(s, BOOT_SYSTEM_MAP);
data/util-linux-2.36.1/sys-utils/readprofile.c:96:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(s, uname_info.release);
data/util-linux-2.36.1/sys-utils/readprofile.c:125:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(27));
data/util-linux-2.36.1/sys-utils/readprofile.c:126:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("readprofile(8)"));
data/util-linux-2.36.1/sys-utils/readprofile.c:389:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(fn_name, next_name);
data/util-linux-2.36.1/sys-utils/renice.c:76:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/renice.c:77:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("renice(1)"));
data/util-linux-2.36.1/sys-utils/rfkill.c:280:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(path, sizeof(path), _PATH_SYS_RFKILL "/rfkill%u/%s", idx, attr);
data/util-linux-2.36.1/sys-utils/rfkill.c:316:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(filename, sizeof(filename) - 1,
data/util-linux-2.36.1/sys-utils/rfkill.c:318:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(filename, F_OK) == 0)
data/util-linux-2.36.1/sys-utils/rfkill.c:588:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/rfkill.c:608:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout, USAGE_MAN_TAIL("rfkill(8)"));
data/util-linux-2.36.1/sys-utils/rtcwake.c:121:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/sys-utils/rtcwake.c:122:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("rtcwake(8)"));
data/util-linux-2.36.1/sys-utils/rtcwake.c:134:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buf, sizeof buf, SYS_WAKEUP_PATH_TEMPLATE, devname + skip);
data/util-linux-2.36.1/sys-utils/rtcwake.c:602:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (!access(_PATH_SHUTDOWN, X_OK)) {
data/util-linux-2.36.1/sys-utils/rtcwake.c:608:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		} else if (!access(_PATH_POWEROFF, X_OK)) {
data/util-linux-2.36.1/sys-utils/rtcwake.c:620:5:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execv(arg[0], arg);
data/util-linux-2.36.1/sys-utils/setarch.c:123:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/sys-utils/setarch.c:124:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("setarch(8)"));
data/util-linux-2.36.1/sys-utils/setarch.c:472:3:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execl(shell, shell_arg, (char *)NULL);
data/util-linux-2.36.1/sys-utils/setarch.c:477:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(argv[0], argv);
data/util-linux-2.36.1/sys-utils/setpriv.c:150:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(29));
data/util-linux-2.36.1/sys-utils/setpriv.c:153:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("setpriv(1)"));
data/util-linux-2.36.1/sys-utils/setpriv.c:398:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(_PATH_SYS_SELINUX, F_OK) == 0)
data/util-linux-2.36.1/sys-utils/setpriv.c:401:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(_PATH_SYS_APPARMOR, F_OK) == 0) {
data/util-linux-2.36.1/sys-utils/setpriv.c:432:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, str);	/* It's exactly the right length */
data/util-linux-2.36.1/sys-utils/setpriv.c:622:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(_PATH_SYS_SELINUX, F_OK) != 0)
data/util-linux-2.36.1/sys-utils/setpriv.c:645:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(_PATH_SYS_APPARMOR, F_OK) != 0)
data/util-linux-2.36.1/sys-utils/setpriv.c:1065:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(argv[optind], argv + optind);
data/util-linux-2.36.1/sys-utils/setsid.c:44:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/sys-utils/setsid.c:46:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("setsid(1)"));
data/util-linux-2.36.1/sys-utils/setsid.c:121:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(argv[optind], argv + optind);
data/util-linux-2.36.1/sys-utils/swapoff.c:151:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/swapoff.c:161:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("swapoff(8)"));
data/util-linux-2.36.1/sys-utils/swapon.c:182:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(data, R_OK) == 0)
data/util-linux-2.36.1/sys-utils/swapon.c:342:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(cmd[0], (char * const *) cmd);
data/util-linux-2.36.1/sys-utils/swapon.c:772:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (prop.no_fail && access(device, R_OK) != 0) {
data/util-linux-2.36.1/sys-utils/swapon.c:813:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(26));
data/util-linux-2.36.1/sys-utils/swapon.c:834:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("swapon(8)"));
data/util-linux-2.36.1/sys-utils/switch_root.c:212:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/sys-utils/switch_root.c:213:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("switch_root(8)"));
data/util-linux-2.36.1/sys-utils/switch_root.c:256:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(init, X_OK))
data/util-linux-2.36.1/sys-utils/switch_root.c:259:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(init, initargs);
data/util-linux-2.36.1/sys-utils/tunelp.c:115:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(30));
data/util-linux-2.36.1/sys-utils/tunelp.c:116:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("tunelp(8)"));
data/util-linux-2.36.1/sys-utils/umount.c:109:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/sys-utils/umount.c:110:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("umount(8)"));
data/util-linux-2.36.1/sys-utils/umount.c:342:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			warnx(access(spec, F_OK) == 0 ?
data/util-linux-2.36.1/sys-utils/umount.c:366:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			warnx(access(spec, F_OK) == 0 ?
data/util-linux-2.36.1/sys-utils/unshare.c:343:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(27));
data/util-linux-2.36.1/sys-utils/unshare.c:344:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("unshare(1)"));
data/util-linux-2.36.1/sys-utils/unshare.c:706:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argv[optind], argv + optind);
data/util-linux-2.36.1/sys-utils/wdctl.c:192:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(*p, F_OK) == 0)
data/util-linux-2.36.1/sys-utils/wdctl.c:225:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(24));
data/util-linux-2.36.1/sys-utils/wdctl.c:237:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("wdctl(8)"));
data/util-linux-2.36.1/sys-utils/wdctl.c:388:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(P_("Timeout has been set to %d second.\n",
data/util-linux-2.36.1/sys-utils/wdctl.c:513:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(P_("%-14s %2i second\n", "%-14s %2i seconds\n", wd->timeout),
data/util-linux-2.36.1/sys-utils/wdctl.c:516:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(P_("%-14s %2i second\n", "%-14s %2i seconds\n", wd->pretimeout),
data/util-linux-2.36.1/sys-utils/wdctl.c:519:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(P_("%-14s %2i second\n", "%-14s %2i seconds\n", wd->timeleft),
data/util-linux-2.36.1/sys-utils/zramctl.c:277:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		z->has_control = access(_PATH_SYS_CLASS "/zram-control/", F_OK) == 0 ? 1 : 0;
data/util-linux-2.36.1/sys-utils/zramctl.c:562:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(27));
data/util-linux-2.36.1/sys-utils/zramctl.c:565:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<size>")));
data/util-linux-2.36.1/sys-utils/zramctl.c:571:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("zramctl(8)"));
data/util-linux-2.36.1/term-utils/agetty.c:336:37:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			       __attribute__((__format__(printf, 1, 2)));
data/util-linux-2.36.1/term-utils/agetty.c:338:31:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				__attribute__((__format__(printf, 1, 2)));
data/util-linux-2.36.1/term-utils/agetty.c:356:24:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define debug(s) do { fprintf(dbf,s); fflush(dbf); } while (0)
data/util-linux-2.36.1/term-utils/agetty.c:565:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(options.login, login_argv);
data/util-linux-2.36.1/term-utils/agetty.c:1967:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(_PATH_ISSUE, F_OK|R_OK) == 0) {
data/util-linux-2.36.1/term-utils/agetty.c:2056:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (access(_PATH_NUMLOCK_ON, F_OK) == 0)
data/util-linux-2.36.1/term-utils/agetty.c:2479:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("agetty(8)"));
data/util-linux-2.36.1/term-utils/agetty.c:2524:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(buf, sizeof(buf), new_fmt, ap);
data/util-linux-2.36.1/term-utils/agetty.c:2821:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(ie->output, P_("%d user", "%d users", users), users);
data/util-linux-2.36.1/term-utils/mesg.c:85:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/term-utils/mesg.c:86:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("mesg(1)"));
data/util-linux-2.36.1/term-utils/script.c:176:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (!str || sscanf(str, "%"SCNi64, &sec) != 1)
data/util-linux-2.36.1/term-utils/script.c:216:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(31));
data/util-linux-2.36.1/term-utils/script.c:217:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("script(1)"));
data/util-linux-2.36.1/term-utils/script.c:544:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = vsnprintf(msg, sizeof(msg), msgfmt, ap);
data/util-linux-2.36.1/term-utils/script.c:582:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = vsnprintf(msg, sizeof(msg), msgfmt, ap);
data/util-linux-2.36.1/term-utils/script.c:974:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(shell, X_OK) == 0) {
data/util-linux-2.36.1/term-utils/script.c:976:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(shell, shname, "-c", command, (char *)NULL);
data/util-linux-2.36.1/term-utils/script.c:978:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(shell, shname, "-i", (char *)NULL);
data/util-linux-2.36.1/term-utils/script.c:981:5:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execlp(shname, "-c", command, (char *)NULL);
data/util-linux-2.36.1/term-utils/script.c:983:5:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execlp(shname, "-i", (char *)NULL);
data/util-linux-2.36.1/term-utils/scriptlive.c:76:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/term-utils/scriptlive.c:78:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("scriptlive(1)"));
data/util-linux-2.36.1/term-utils/scriptlive.c:317:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (access(shell, X_OK) == 0) {
data/util-linux-2.36.1/term-utils/scriptlive.c:319:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(shell, shname, "-c", command, (char *)NULL);
data/util-linux-2.36.1/term-utils/scriptlive.c:321:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(shell, shname, "-i", (char *)NULL);
data/util-linux-2.36.1/term-utils/scriptlive.c:324:5:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execlp(shname, "-c", command, (char *)NULL);
data/util-linux-2.36.1/term-utils/scriptlive.c:326:5:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execlp(shname, "-i", (char *)NULL);
data/util-linux-2.36.1/term-utils/scriptreplay.c:70:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/term-utils/scriptreplay.c:72:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("scriptreplay(1)"));
data/util-linux-2.36.1/term-utils/setterm.c:444:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("setterm(1)"));
data/util-linux-2.36.1/term-utils/wall.c:98:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/term-utils/wall.c:99:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("wall(1)"));
data/util-linux-2.36.1/term-utils/wall.c:237:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (argc == 1 && access(argv[0], F_OK) == 0)
data/util-linux-2.36.1/term-utils/wall.c:309:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	rc = vsnprintf(bs->data + bs->used, limit, fmt, ap);
data/util-linux-2.36.1/term-utils/wall.c:316:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = vsnprintf(bs->data  + bs->used, limit, fmt, ap);
data/util-linux-2.36.1/term-utils/wall.c:357:16:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
		if (!(whom = getlogin()) || !*whom)
data/util-linux-2.36.1/term-utils/write.c:94:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/term-utils/write.c:95:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("write(1)"));
data/util-linux-2.36.1/term-utils/write.c:175:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "/dev/%s", u->ut_line);
data/util-linux-2.36.1/term-utils/write.c:258:15:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
	if ((login = getlogin()) == NULL)
data/util-linux-2.36.1/text-utils/col.c:154:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("col(1)"));
data/util-linux-2.36.1/text-utils/colcrt.c:92:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(25));
data/util-linux-2.36.1/text-utils/colcrt.c:94:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("colcrt(1)"));
data/util-linux-2.36.1/text-utils/colrm.c:68:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/text-utils/colrm.c:71:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("colrm(1)"));
data/util-linux-2.36.1/text-utils/column.c:659:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(34));
data/util-linux-2.36.1/text-utils/column.c:660:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("column(1)"));
data/util-linux-2.36.1/text-utils/hexdump-conv.c:77:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, *p);
data/util-linux-2.36.1/text-utils/hexdump-conv.c:82:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, str);
data/util-linux-2.36.1/text-utils/hexdump-conv.c:100:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, list[*p]);
data/util-linux-2.36.1/text-utils/hexdump-conv.c:103:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, "del");
data/util-linux-2.36.1/text-utils/hexdump-conv.c:106:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, *p);
data/util-linux-2.36.1/text-utils/hexdump-conv.c:109:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, *p);
data/util-linux-2.36.1/text-utils/hexdump-display.c:119:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, address);
data/util-linux-2.36.1/text-utils/hexdump-display.c:122:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, "");
data/util-linux-2.36.1/text-utils/hexdump-display.c:128:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, *bp);
data/util-linux-2.36.1/text-utils/hexdump-display.c:137:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, fval);
data/util-linux-2.36.1/text-utils/hexdump-display.c:141:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, dval);
data/util-linux-2.36.1/text-utils/hexdump-display.c:154:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, (unsigned long long) *bp);
data/util-linux-2.36.1/text-utils/hexdump-display.c:158:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, (unsigned long long) sval);
data/util-linux-2.36.1/text-utils/hexdump-display.c:162:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, (unsigned long long) ival);
data/util-linux-2.36.1/text-utils/hexdump-display.c:166:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, Lval);
data/util-linux-2.36.1/text-utils/hexdump-display.c:172:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, isprint(*bp) ? *bp : '.');
data/util-linux-2.36.1/text-utils/hexdump-display.c:175:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(pr->fmt, (char *)bp);
data/util-linux-2.36.1/text-utils/hexdump-display.c:191:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, (unsigned long long) *bp);
data/util-linux-2.36.1/text-utils/hexdump-display.c:195:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, (unsigned long long) sval);
data/util-linux-2.36.1/text-utils/hexdump-display.c:199:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, (unsigned long long) ival);
data/util-linux-2.36.1/text-utils/hexdump-display.c:203:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(pr->fmt, Lval);
data/util-linux-2.36.1/text-utils/hexdump-display.c:311:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(pr->fmt, eaddress);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:427:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(pr->fmt, fmtp);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:428:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(pr->fmt, cs);
data/util-linux-2.36.1/text-utils/hexdump.c:184:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(27));
data/util-linux-2.36.1/text-utils/hexdump.c:187:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_ARG_SIZE(_("<length> and <offset>")));
data/util-linux-2.36.1/text-utils/hexdump.c:189:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("hexdump(1)"));
data/util-linux-2.36.1/text-utils/line.c:37:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/text-utils/line.c:38:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("line(1)"));
data/util-linux-2.36.1/text-utils/more.c:252:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(23));
data/util-linux-2.36.1/text-utils/more.c:253:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("more(1)"));
data/util-linux-2.36.1/text-utils/more.c:1133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(outstr, ctl->file_names[ctl->argv_position]);
data/util-linux-2.36.1/text-utils/more.c:1140:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(outstr, ctl->shell_line);
data/util-linux-2.36.1/text-utils/more.c:1259:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(cmd, args);
data/util-linux-2.36.1/text-utils/more.c:1558:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(P_("...back %d page", "...back %d pages", nlines), nlines);
data/util-linux-2.36.1/text-utils/more.c:1582:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(P_("...skipping %d line",
data/util-linux-2.36.1/text-utils/pg.c:250:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/text-utils/pg.c:252:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("pg(1)"));
data/util-linux-2.36.1/text-utils/pg.c:587:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, cmdstr);
data/util-linux-2.36.1/text-utils/pg.c:625:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(b, pstring);
data/util-linux-2.36.1/text-utils/pg.c:627:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(b, p + 2);
data/util-linux-2.36.1/text-utils/pg.c:1384:7:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
						execl(sh, sh, "-c",
data/util-linux-2.36.1/text-utils/rev.c:82:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(16));
data/util-linux-2.36.1/text-utils/rev.c:83:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("rev(1)"));
data/util-linux-2.36.1/text-utils/ul.c:151:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_HELP_OPTIONS(30));
data/util-linux-2.36.1/text-utils/ul.c:153:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(USAGE_MAN_TAIL("ul(1)"));
data/util-linux-2.36.1/Documentation/boilerplate.c:89:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "nr:zelfVh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/addpart.c:41:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/cfdisk.c:2701:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "L::hVz", longopts, NULL)) != -1) {
data/util-linux-2.36.1/disk-utils/delpart.c:41:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/fdformat.c:192:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "f:t:r:nVh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/fdisk.c:955:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "b:Bc::C:hH:lL::no:sS:t:u::vVw:W:x",
data/util-linux-2.36.1/disk-utils/fsck.c:493:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	path = getenv("FSTAB_FILE");
data/util-linux-2.36.1/disk-utils/fsck.c:753:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		while (inst->next && (random() & 1)) {
data/util-linux-2.36.1/disk-utils/fsck.c:875:43:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		if (noexecute && (flags & WNOHANG) && !(random() % 3))
data/util-linux-2.36.1/disk-utils/fsck.c:1600:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("FSCK_FORCE_ALL_PARALLEL"))
data/util-linux-2.36.1/disk-utils/fsck.c:1602:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((tmp = getenv("FSCK_MAX_INST")))
data/util-linux-2.36.1/disk-utils/fsck.c:1611:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *path = getenv("PATH");
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:670:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "ayvVhb:", longopts, NULL)) != EOF)
data/util-linux-2.36.1/disk-utils/fsck.minix.c:1299:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt_long(argc, argv, "larvsmfVh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/isosize.c:133:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "d:xVh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:136:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "N:V:F:vhcl", longopts, NULL)) != -1) {
data/util-linux-2.36.1/disk-utils/mkfs.c:91:18:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	       && ((i = getopt_long(argc, argv, "Vt:h", longopts, NULL))
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:731:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "hb:Ee:i:n:N:psVvz")) != EOF) {
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:156:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *str = getenv("MKFS_MINIX_TEST_SECOND_SINCE_EPOCH");
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:765:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt_long(argc, argv, "1v23n:i:cl:Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/mkswap.c:385:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "cfp:L:v:U:Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/disk-utils/partx.c:838:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/disk-utils/raw.c:113:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "qaVh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/resizepart.c:85:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/sfdisk.c:334:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *home = getenv ("HOME");
data/util-linux-2.36.1/disk-utils/sfdisk.c:2186:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "aAbcdfFgGhJlLo:O:nN:qrsTu:vVX:Y:w:W:",
data/util-linux-2.36.1/disk-utils/swaplabel.c:157:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "hVL:U:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/include/debug.h:106:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *envstr = mask ? NULL : getenv(# env); \
data/util-linux-2.36.1/include/randutils.h:5:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define srand(x)	srandom(x)
data/util-linux-2.36.1/include/randutils.h:5:18:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define srand(x)	srandom(x)
data/util-linux-2.36.1/include/randutils.h:6:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define rand()		random()
data/util-linux-2.36.1/lib/blkdev.c:371:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		lockmode = getenv("LOCK_BLOCK_DEVICE");
data/util-linux-2.36.1/lib/canonicalize.c:128:14:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	canonical = realpath(path, NULL);
data/util-linux-2.36.1/lib/canonicalize.c:179:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			canonical = realpath(path, NULL);
data/util-linux-2.36.1/lib/colors.c:338:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *p = getenv("XDG_CONFIG_HOME");
data/util-linux-2.36.1/lib/colors.c:345:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	p = getenv("HOME");
data/util-linux-2.36.1/lib/colors.c:577:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	cc->termname = getenv("TERM");
data/util-linux-2.36.1/lib/colors.c:867:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "C:c:m:n:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/lib/cpuset.c:355:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "n:m:r:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/lib/env.c:107:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	return getenv(arg);
data/util-linux-2.36.1/lib/env.c:132:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		p = getenv(copy);
data/util-linux-2.36.1/lib/exec_shell.c:35:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *shell = getenv("SHELL");
data/util-linux-2.36.1/lib/fileutils.c:58:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tmpenv = dir ? dir : getenv("TMPDIR");
data/util-linux-2.36.1/lib/pager.c:188:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	path = getenv("PATH");
data/util-linux-2.36.1/lib/pager.c:212:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *pager = getenv("PAGER");
data/util-linux-2.36.1/lib/path.c:1083:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "p:h", longopts, NULL)) != -1) {
data/util-linux-2.36.1/lib/pty-session.c:656:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	shell = getenv("SHELL");
data/util-linux-2.36.1/lib/randutils.c:68:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((n_pid << 16) ^ n_uid ^ tv.tv_sec ^ tv.tv_usec);
data/util-linux-2.36.1/lib/randutils.c:175:14:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			*cp++ ^= (jrand48(tmp_seed) >> 7) & 0xFF;
data/util-linux-2.36.1/lib/timeutils.c:556:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *zone = getenv("TZ");
data/util-linux-2.36.1/lib/ttyutils.c:16:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *cp = getenv(name);
data/util-linux-2.36.1/lib/ttyutils.c:127:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	*type = getenv("TERM");
data/util-linux-2.36.1/libblkid/src/dev.c:234:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt (argc, argv, "m:f:")) != EOF)
data/util-linux-2.36.1/libblkid/src/tag.c:408:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt (argc, argv, "m:f:")) != EOF)
data/util-linux-2.36.1/libfdisk/samples/mkpart-fullspec.c:73:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "x:d:h", longopts, NULL)) != -1) {
data/util-linux-2.36.1/libfdisk/samples/mkpart.c:88:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "g:x:d:h", longopts, NULL)) != -1) {
data/util-linux-2.36.1/libmount/python/pylibmount.c:221:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char *str = getenv("PYLIBMOUNT_DEBUG");
data/util-linux-2.36.1/libmount/src/utils.c:1031:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	path = getenv("LIBMOUNT_KERNEL_CMDLINE");
data/util-linux-2.36.1/libsmartcols/samples/fromfile.c:260:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "hCc:Ei:JMmn:p:rw:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/libsmartcols/samples/grouping-overlay.c:79:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "hmw:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/libsmartcols/samples/grouping-simple.c:79:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "hmw:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/libsmartcols/samples/title.c:78:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "hmw:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/libsmartcols/samples/tree.c:185:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "ciJlnprS:E:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/libsmartcols/src/table.c:55:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	str = getenv("LIBSMARTCOLS_DEBUG_PADDING");
data/util-linux-2.36.1/login-utils/chfn.c:151:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "f:r:p:h:o:uv", long_options,
data/util-linux-2.36.1/login-utils/chsh.c:167:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "s:lhuv", long_options, NULL)) != -1) {
data/util-linux-2.36.1/login-utils/last.c:958:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/login-utils/login.c:1085:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	termenv = getenv("TERM");
data/util-linux-2.36.1/login-utils/login.c:1243:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "fHh:pV", longopts, NULL)) != -1)
data/util-linux-2.36.1/login-utils/login.c:1389:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			mail = getenv("MAIL");
data/util-linux-2.36.1/login-utils/lslogins.c:1491:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "acefGg:hLl:no:prsuVzZ",
data/util-linux-2.36.1/login-utils/newgrp.c:201:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/login-utils/nologin.c:70:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "c:ilrhV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/login-utils/su-common.c:625:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *env = getenv(name);
data/util-linux-2.36.1/login-utils/su-common.c:1012:3:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		getopt_long(argc, argv, "c:fg:G:lmpPs:u:hVw:", longopts,
data/util-linux-2.36.1/login-utils/su-common.c:1156:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			shell = getenv("SHELL");
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:253:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	    name = realpath(path, NULL);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:277:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		name = realpath(path, NULL);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:296:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		name = realpath(path, NULL);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:627:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	consoles_debug = getenv("CONSOLES_DEBUG") ? 1 : 0;
data/util-linux-2.36.1/login-utils/sulogin.c:738:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((p = getenv("SUSHELL")) != NULL)
data/util-linux-2.36.1/login-utils/sulogin.c:740:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	else if ((p = getenv("sushell")) != NULL)
data/util-linux-2.36.1/login-utils/sulogin.c:864:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "ehpt:V", longopts, NULL)) != -1) {
data/util-linux-2.36.1/login-utils/sulogin.c:904:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		tty = getenv("CONSOLE");
data/util-linux-2.36.1/login-utils/utmpdump.c:341:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "fro:hV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/login-utils/vipw.c:197:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	editor = getenv("EDITOR");
data/util-linux-2.36.1/login-utils/vipw.c:338:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/misc-utils/blkid.c:707:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long (argc, argv,
data/util-linux-2.36.1/misc-utils/cal.c:273:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *str = getenv("CAL_TEST_TIME");
data/util-linux-2.36.1/misc-utils/cal.c:344:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	term = getenv("TERM");
data/util-linux-2.36.1/misc-utils/cal.c:388:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "13mjn:sSywYvVh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/misc-utils/fincore.c:311:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long (argc, argv, "bno:JrVh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/misc-utils/findfs.c:62:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/misc-utils/findmnt.c:394:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	path = realpath(devname, NULL);
data/util-linux-2.36.1/misc-utils/findmnt.c:1366:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/misc-utils/getopt.c:384:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("GETOPT_COMPATIBLE"))
data/util-linux-2.36.1/misc-utils/getopt.c:400:19:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	getopt_long_fp = getopt_long;
data/util-linux-2.36.1/misc-utils/getopt.c:411:3:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		getopt_long(argc, argv, shortopts, longopts, NULL)) != EOF)
data/util-linux-2.36.1/misc-utils/hardlink.c:418:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "cnvfx:Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/misc-utils/logger.c:152:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *str = getenv("LOGGER_TEST_TIMEOFDAY");
data/util-linux-2.36.1/misc-utils/logger.c:166:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *str = getenv("LOGGER_TEST_HOSTNAME");
data/util-linux-2.36.1/misc-utils/logger.c:172:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *str = getenv("LOGGER_TEST_GETPID");
data/util-linux-2.36.1/misc-utils/logger.c:1165:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "ef:ip:S:st:u:dTn:P:Vh",
data/util-linux-2.36.1/misc-utils/look.c:107:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((file = getenv("WORDLIST")) && !access(file, R_OK))
data/util-linux-2.36.1/misc-utils/look.c:115:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "adft:Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/misc-utils/lsblk.c:1888:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv,
data/util-linux-2.36.1/misc-utils/lslocks.c:590:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/misc-utils/mcookie.c:156:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "f:m:vVh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/misc-utils/namei.c:377:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "hVlmnovx", longopts, NULL)) != -1) {
data/util-linux-2.36.1/misc-utils/rename.c:257:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "vsVhnoi", longopts, NULL)) != -1)
data/util-linux-2.36.1/misc-utils/test_uuidd.c:274:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while (((c = getopt(argc, argv, "p:t:o:l:h")) != -1)) {
data/util-linux-2.36.1/misc-utils/uuidd.c:581:3:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		getopt_long(argc, argv, "p:s:T:krtn:PFSdqVh", longopts,
data/util-linux-2.36.1/misc-utils/uuidgen.c:109:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "rtVhn:N:msx", longopts, NULL)) != -1)
data/util-linux-2.36.1/misc-utils/uuidparse.c:309:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "Jno:rVh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/misc-utils/whereis.c:312:50:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *key = NULL, *tok = NULL, *pathcp, *path = getenv(env);
data/util-linux-2.36.1/misc-utils/wipefs.c:557:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char *home = getenv ("HOME");
data/util-linux-2.36.1/misc-utils/wipefs.c:720:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "abfhiJnO:o:pqt:V", longopts, NULL)) != -1) {
data/util-linux-2.36.1/schedutils/chrt.c:449:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "+abdD:fiphmoP:T:rRvV", longopts, NULL)) != -1)
data/util-linux-2.36.1/schedutils/ionice.c:154:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "+n:c:p:P:u:tVh", longopts, NULL)) != EOF)
data/util-linux-2.36.1/schedutils/taskset.c:164:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "+apchV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/blkdiscard.c:177:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "hfVsvo:l:p:z", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/blkzone.c:422:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "hc:l:o:fvV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/chcpu.c:311:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "c:d:e:g:hp:rV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/chmem.c:391:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "bdehvVz:", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/choom.c:99:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "hn:p:V", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/ctrlaltdel.c:98:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/sys-utils/dmesg.c:1294:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *str = getenv("DMESG_TEST_BOOTIME");
data/util-linux-2.36.1/sys-utils/dmesg.c:1308:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("DMESG_TEST_BOOTIME"))
data/util-linux-2.36.1/sys-utils/dmesg.c:1390:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "CcDdEeF:f:HhkL::l:n:iPprSs:TtuVWwx",
data/util-linux-2.36.1/sys-utils/eject.c:203:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/sys-utils/fallocate.c:326:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "hvVncpdizxl:o:", longopts, NULL))
data/util-linux-2.36.1/sys-utils/flock.c:185:3:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		getopt_long(argc, argv, "+sexnoFuw:E:hV?", long_options,
data/util-linux-2.36.1/sys-utils/flock.c:244:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			cmd_argv[0] = getenv("SHELL");
data/util-linux-2.36.1/sys-utils/fsfreeze.c:82:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "hfuV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/fstrim.c:91:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	char *rpath = realpath(path, NULL);
data/util-linux-2.36.1/sys-utils/fstrim.c:478:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "AahI:l:m:no:Vv", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2992:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *tz = getenv ("TZ");
data/util-linux-2.36.1/sys-utils/hwclock.c:145:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	int usec = random() % 1000000;
data/util-linux-2.36.1/sys-utils/hwclock.c:1304:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/sys-utils/ipcmk.c:111:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((opt = getopt_long(argc, argv, "hM:QS:p:Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/ipcrm.c:339:13:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((c = getopt_long(argc, argv, "q:m:s:Q:M:S:a::vhV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/ipcs.c:120:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, options, longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/irqtop.c:259:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((o = getopt_long(argc, argv, "d:o:s:hV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/ldattach.c:323:3:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		getopt_long(argc, argv, "dhV78neo12s:i:c:p:", opttbl,
data/util-linux-2.36.1/sys-utils/losetup.c:654:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "ab:c:d:Dfhj:JlLno:O:PrvV",
data/util-linux-2.36.1/sys-utils/lscpu.c:2335:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "aBbC::ce::hJp::s:xyV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/lsipc.c:1146:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "bceghi:Jlmno:PqrstV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/lsirq.c:103:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "no:s:hJPV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/lsmem.c:580:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "abhJno:PrS:s:V", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/lsns.c:973:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/sys-utils/mount.c:670:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "aBcfFhilL:Mno:O:rRsU:vVwt:T:N:",
data/util-linux-2.36.1/sys-utils/mountpoint.c:163:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "qdxhV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/nsenter.c:254:3:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		getopt_long(argc, argv, "+ahVt:m::u::i::n::p::C::U::T::S:G:r::w::FZ",
data/util-linux-2.36.1/sys-utils/nsenter.c:458:7:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if (chroot(".") < 0)
data/util-linux-2.36.1/sys-utils/pivot_root.c:60:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/sys-utils/prlimit.c:531:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while((opt = getopt_long(argc, argv,
data/util-linux-2.36.1/sys-utils/readprofile.c:177:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "m:p:M:ivabsrnVh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/rfkill.c:642:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "Jno:rVh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/rtcwake.c:470:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((t = getopt_long(argc, argv, "A:ahd:lm:ns:t:uVv",
data/util-linux-2.36.1/sys-utils/setarch.c:365:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "+hVv3BFILRSTXZ", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/setpriv.c:663:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *term = getenv("TERM");
data/util-linux-2.36.1/sys-utils/setpriv.c:815:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "+dhV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/setsid.c:71:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "+Vhcfw", longopts, NULL)) != -1)
data/util-linux-2.36.1/sys-utils/swapoff.c:231:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "ahvVL:U:",
data/util-linux-2.36.1/sys-utils/swapon.c:893:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "ahd::efo:p:svVL:U:",
data/util-linux-2.36.1/sys-utils/switch_root.c:177:6:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	if (chroot(".")) {
data/util-linux-2.36.1/sys-utils/switch_root.c:230:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "+Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/sys-utils/tunelp.c:160:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "t:c:w:a:i:ho:C:sq:rT:vV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/umount.c:502:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "aAcdfhilnqRrO:t:vVN:",
data/util-linux-2.36.1/sys-utils/unshare.c:422:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "+fhVmuinpCTUrR:w:S:G:c", longopts, NULL)) != -1) {
data/util-linux-2.36.1/sys-utils/unshare.c:644:7:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if (chroot(newroot) != 0)
data/util-linux-2.36.1/sys-utils/wdctl.c:626:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/sys-utils/zramctl.c:624:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "a:bfho:nrs:t:V", longopts, NULL)) != -1) {
data/util-linux-2.36.1/term-utils/agetty.c:186:8:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	char *chroot;			/* Chroot before the login */
data/util-linux-2.36.1/term-utils/agetty.c:548:14:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	if (options.chroot && chroot(options.chroot) < 0)
data/util-linux-2.36.1/term-utils/agetty.c:548:24:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	if (options.chroot && chroot(options.chroot) < 0)
data/util-linux-2.36.1/term-utils/agetty.c:548:39:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
	if (options.chroot && chroot(options.chroot) < 0)
data/util-linux-2.36.1/term-utils/agetty.c:550:25:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
			options.tty, options.chroot);
data/util-linux-2.36.1/term-utils/agetty.c:757:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv,
data/util-linux-2.36.1/term-utils/mesg.c:110:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "vVh", longopts, NULL)) != -1)
data/util-linux-2.36.1/term-utils/script.c:173:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *str = getenv("SCRIPT_TEST_SECOND_SINCE_EPOCH");
data/util-linux-2.36.1/term-utils/script.c:808:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "aB:c:eE:fI:O:o:qm:T:t::Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/term-utils/script.c:915:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	shell = getenv("SHELL");
data/util-linux-2.36.1/term-utils/scriptlive.c:203:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "c:B:I:T:t:d:m:Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/term-utils/scriptlive.c:273:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	shell = getenv("SHELL");
data/util-linux-2.36.1/term-utils/scriptreplay.c:178:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "B:c:I:O:T:t:s:d:m:x:Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/term-utils/setterm.c:1165:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		ctl->opt_te_terminal_name = getenv("TERM");
data/util-linux-2.36.1/term-utils/wall.c:209:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "nt:g:Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/term-utils/write.c:313:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/tests/helpers/test_sigreceive.c:65:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "s:h", longopts, NULL)) != -1)
data/util-linux-2.36.1/text-utils/col.c:199:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "bfhl:pxVH", longopts, NULL)) != -1)
data/util-linux-2.36.1/text-utils/colcrt.c:257:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "2Vh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/text-utils/colrm.c:172:3:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		getopt_long(argc, argv, "bfhl:pxVH", longopts,
data/util-linux-2.36.1/text-utils/column.c:718:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "c:dE:eH:hi:JLN:n:O:o:p:R:r:s:T:tVW:x", longopts, NULL)) != -1) {
data/util-linux-2.36.1/text-utils/hexdump.c:92:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "bcCde:f:L::n:os:vxhV", longopts, NULL)) != -1) {
data/util-linux-2.36.1/text-utils/line.c:59:16:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((opt = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/text-utils/more.c:301:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(as_argc, as_argv, "dflcpsun:eVh", longopts, NULL)) != -1) {
data/util-linux-2.36.1/text-utils/more.c:1476:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	editor = getenv("VISUAL");
data/util-linux-2.36.1/text-utils/more.c:1478:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		editor = getenv("EDITOR");
data/util-linux-2.36.1/text-utils/more.c:1943:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((term = getenv("TERM")) == NULL) {
data/util-linux-2.36.1/text-utils/more.c:1996:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((ctl->shell = getenv("SHELL")) == NULL)
data/util-linux-2.36.1/text-utils/more.c:2026:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((s = getenv("MORE")) != NULL)
data/util-linux-2.36.1/text-utils/pg.c:323:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if ((p = getenv("LINES")) != NULL && *p != '\0')
data/util-linux-2.36.1/text-utils/pg.c:326:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if ((p = getenv("COLUMNS")) != NULL && *p != '\0')
data/util-linux-2.36.1/text-utils/pg.c:1369:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
						const char *sh = getenv("SHELL");
data/util-linux-2.36.1/text-utils/rev.c:122:15:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((ch = getopt_long(argc, argv, "Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/text-utils/ul.c:180:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	termtype = getenv("TERM");
data/util-linux-2.36.1/text-utils/ul.c:182:14:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt_long(argc, argv, "it:T:Vh", longopts, NULL)) != -1)
data/util-linux-2.36.1/disk-utils/addpart.c:56:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(argv[1], O_RDONLY)) < 0)
data/util-linux-2.36.1/disk-utils/blockdev.c:291:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(argv[k], O_RDONLY, 0);
data/util-linux-2.36.1/disk-utils/blockdev.c:354:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				iarg = atoi(argv[++i]);
data/util-linux-2.36.1/disk-utils/blockdev.c:430:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[200];
data/util-linux-2.36.1/disk-utils/blockdev.c:431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ptname[200 + 1];
data/util-linux-2.36.1/disk-utils/blockdev.c:432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device[210];
data/util-linux-2.36.1/disk-utils/blockdev.c:435:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	procpt = fopen(_PATH_PROC_PARTITIONS, "r");
data/util-linux-2.36.1/disk-utils/blockdev.c:458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char start_str[11] = { "\0" };
data/util-linux-2.36.1/disk-utils/blockdev.c:461:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(device, O_RDONLY | O_NONBLOCK);
data/util-linux-2.36.1/disk-utils/blockdev.c:486:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(start_str, "%10ju", start);
data/util-linux-2.36.1/disk-utils/cfdisk.c:837:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ignore[128] = { 0 };
data/util-linux-2.36.1/disk-utils/cfdisk.c:1353:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(data))
data/util-linux-2.36.1/disk-utils/cfdisk.c:1359:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(data))
data/util-linux-2.36.1/disk-utils/cfdisk.c:1365:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(data))
data/util-linux-2.36.1/disk-utils/cfdisk.c:1877:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/util-linux-2.36.1/disk-utils/cfdisk.c:2029:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			free((char *) cm[i].name);
data/util-linux-2.36.1/disk-utils/cfdisk.c:2040:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX] = { 0 };
data/util-linux-2.36.1/disk-utils/cfdisk.c:2070:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX] = { 0 };
data/util-linux-2.36.1/disk-utils/cfdisk.c:2094:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(buf, "w");
data/util-linux-2.36.1/disk-utils/cfdisk.c:2450:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[64] = { 0 };
data/util-linux-2.36.1/disk-utils/cramfs_common.c:49:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char inode_out_buf[sizeof(*inode_in)];
data/util-linux-2.36.1/disk-utils/delpart.c:57:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(argv[1], O_RDONLY)) < 0)
data/util-linux-2.36.1/disk-utils/fdisk-list.c:29:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(device, O_RDONLY)) < 0)
data/util-linux-2.36.1/disk-utils/fdisk-list.c:322:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[128 + 1];
data/util-linux-2.36.1/disk-utils/fdisk-list.c:325:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		*f = fopen(_PATH_PROC_PARTITIONS, "r");
data/util-linux-2.36.1/disk-utils/fdisk-list.c:333:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[PATH_MAX], *cn;
data/util-linux-2.36.1/disk-utils/fdisk-list.c:472:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[namesz + 1];
data/util-linux-2.36.1/disk-utils/fdisk-list.c:478:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, name, namesz);
data/util-linux-2.36.1/disk-utils/fdisk-list.c:529:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fields_ids, dflt_ids, fields_nids * sizeof(int));
data/util-linux-2.36.1/disk-utils/fdisk-menu.c:421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ] = { '\0' };
data/util-linux-2.36.1/disk-utils/fdisk-menu.c:523:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "w");
data/util-linux-2.36.1/disk-utils/fdisk.c:145:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(buf, reply_line, min(sz, bufsz));
data/util-linux-2.36.1/disk-utils/fdisk.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char prompt[128];
data/util-linux-2.36.1/disk-utils/fdisk.c:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[128] = { '\0' };
data/util-linux-2.36.1/disk-utils/fdisk.c:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[128] = { '\0' };
data/util-linux-2.36.1/disk-utils/fdisk.c:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ] = { '\0' };
data/util-linux-2.36.1/disk-utils/fdisk.c:455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char prmt[BUFSIZ];
data/util-linux-2.36.1/disk-utils/fdisk.c:493:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[256] = { '\0' };
data/util-linux-2.36.1/disk-utils/fdisk.c:548:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[NAME_WIDTH * MB_LEN_MAX];
data/util-linux-2.36.1/disk-utils/fdisk.c:811:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(dev, O_RDONLY)) < 0)
data/util-linux-2.36.1/disk-utils/fsck.c:130:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *devices[MAX_DEVICES];
data/util-linux-2.36.1/disk-utils/fsck.c:131:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *args[MAX_ARGS];
data/util-linux-2.36.1/disk-utils/fsck.c:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/disk-utils/fsck.c:322:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r");
data/util-linux-2.36.1/disk-utils/fsck.c:373:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	inst->lock = open(inst->lockpath, O_RDONLY|O_CREAT|O_CLOEXEC,
data/util-linux-2.36.1/disk-utils/fsck.c:630:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[80];
data/util-linux-2.36.1/disk-utils/fsck.c:649:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[80];
data/util-linux-2.36.1/disk-utils/fsck.c:815:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&inst->rusage, &rusage, sizeof(struct rusage));
data/util-linux-2.36.1/disk-utils/fsck.c:1177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[PATH_MAX];
data/util-linux-2.36.1/disk-utils/fsck.c:1425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	options[128];
data/util-linux-2.36.1/disk-utils/fsck.c:1603:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    max_running = atoi(tmp);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char read_buffer[ROMBUFFERSIZE * 2];
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:153:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDONLY);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:282:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[10];
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:456:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newpath, path, pathlen);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:477:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newpath + pathlen, romfs_read(offset), newlen);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:512:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		outfd = open(path, O_WRONLY | O_CREAT | O_TRUNC, i->mode);
data/util-linux-2.36.1/disk-utils/fsck.minix.c:133:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char name_list[MAX_DEPTH][MINIX_NAME_MAX + 1];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:137:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char current_name[MAX_DEPTH * (MINIX_NAME_MAX + 1) + 1];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input[YESNO_LENGTH];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:536:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char blk[MINIX_BLOCK_SIZE];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:834:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char blk[MINIX_BLOCK_SIZE];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:850:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char blk[MINIX_BLOCK_SIZE];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:866:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char blk[MINIX_BLOCK_SIZE];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:882:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char blk[MINIX_BLOCK_SIZE];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:898:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char blk[MINIX_BLOCK_SIZE];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:951:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char blk[MINIX_BLOCK_SIZE + 2];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:1022:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char blk[MINIX_BLOCK_SIZE + 4];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:1131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/util-linux-2.36.1/disk-utils/fsck.minix.c:1343:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	device_fd = open(device_name, repair ? O_RDWR : O_RDONLY);
data/util-linux-2.36.1/disk-utils/isosize.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[8];
data/util-linux-2.36.1/disk-utils/isosize.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char volume_space_size[8];
data/util-linux-2.36.1/disk-utils/isosize.c:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char logical_block_size[4];
data/util-linux-2.36.1/disk-utils/isosize.c:52:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(filenamep, O_RDONLY)) < 0) {
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_fsname[6];
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_volume[6];
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_pad[472];
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char i_pad1[2];
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char i_pad2[16];
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char d_name[BFS_NAMELEN];
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:236:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sb.s_fsname, fsname, 6);
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:237:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sb.s_volume, volume, 6);
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:289:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(de.d_name, ".", 1);
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:293:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(de.d_name, "..", 2);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:101:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char md5sum[UL_MD5LENGTH];
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:169:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:298:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path, name, len);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:334:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(endpath, dirent->d_name, namelen + 1);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:480:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(base + offset, entry->name, len);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:658:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_RDONLY);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:662:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(base + offset, buf, image_length);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:797:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(outfile, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char root_block[MINIX_BLOCK_SIZE];
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:120:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char boot_block_buffer[512];
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:415:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp + 4, "..");
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:418:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp + 4, ".badblocks");
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:424:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp + 2, "..");
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:427:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp + 2, ".badblocks");
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:614:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[MINIX_BLOCK_SIZE * TEST_BUFFER_BLOCKS];
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:648:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	listfile = fopen(filename,"r");
data/util-linux-2.36.1/disk-utils/mkswap.c:108:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sp + ctl->pagesize - SWAP_SIGNATURE_SZ, SWAP_SIGNATURE, SWAP_SIGNATURE_SZ);
data/util-linux-2.36.1/disk-utils/mkswap.c:136:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char uuid_string[UUID_STR_LEN];
data/util-linux-2.36.1/disk-utils/mkswap.c:218:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(ctl->devname, O_RDONLY);
data/util-linux-2.36.1/disk-utils/mkswap.c:294:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024] = { '\0' };
data/util-linux-2.36.1/disk-utils/partx.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX], *parent, *dirname = NULL;
data/util-linux-2.36.1/disk-utils/partx.c:1020:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(wholedisk, O_RDONLY)) == -1)
data/util-linux-2.36.1/disk-utils/raw.c:211:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	master_fd = open(_PATH_RAWDEVCTL, O_RDWR, 0);
data/util-linux-2.36.1/disk-utils/raw.c:213:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		master_fd = open(_PATH_RAWDEVCTL_OLD, O_RDWR, 0);
data/util-linux-2.36.1/disk-utils/resizepart.c:103:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(wholedisk, O_RDONLY)) < 0)
data/util-linux-2.36.1/disk-utils/sfdisk.c:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[BUFSIZ] = { '\0' };
data/util-linux-2.36.1/disk-utils/sfdisk.c:294:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, O_CREAT | O_WRONLY, S_IRUSR | S_IWUSR);
data/util-linux-2.36.1/disk-utils/sfdisk.c:495:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(typescript, "w");
data/util-linux-2.36.1/disk-utils/sfdisk.c:806:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev, O_RDONLY);
data/util-linux-2.36.1/disk-utils/sfdisk.c:1594:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, p, len);
data/util-linux-2.36.1/disk-utils/sfdisk.c:1717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/disk-utils/swaplabel.c:63:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(devname, O_RDWR);
data/util-linux-2.36.1/disk-utils/swaplabel.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char newlabel[SWAP_LABEL_LENGTH];
data/util-linux-2.36.1/include/c.h:181:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char prog_inv_sh_nm_buf[256];
data/util-linux-2.36.1/include/loopdev.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		device[128];	/* device path (e.g. /dev/loop<N>) */
data/util-linux-2.36.1/include/md5.h:11:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char in[64];
data/util-linux-2.36.1/include/md5.h:16:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ul_MD5Final(unsigned char digest[UL_MD5LENGTH], struct UL_MD5Context *ctx);
data/util-linux-2.36.1/include/path.h:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_buffer[PATH_MAX];
data/util-linux-2.36.1/include/pt-bsd.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		d_typename[16];		/* type name, e.g. "eagle" */
data/util-linux-2.36.1/include/pt-bsd.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		d_packname[16];		/* pack identifier */
data/util-linux-2.36.1/include/pt-mbr.h:11:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char start_sect[4];
data/util-linux-2.36.1/include/pt-mbr.h:12:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nr_sects[4];
data/util-linux-2.36.1/include/pt-sgi.h:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char boot_file[16];	/* name of boot file */
data/util-linux-2.36.1/include/pt-sgi.h:78:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char name[8];	/* name of volume */
data/util-linux-2.36.1/include/pt-sgi.h:106:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&val, ptr, sizeof(uint32_t));
data/util-linux-2.36.1/include/pt-sun.h:14:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char label_id[128];   /* Informative text string */
data/util-linux-2.36.1/include/pt-sun.h:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	 volume_id[8];/* volume name */
data/util-linux-2.36.1/include/pt-sun.h:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char spare[148];      /* padding */
data/util-linux-2.36.1/include/sha1.h:18:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned	char buffer[64];
data/util-linux-2.36.1/include/sha1.h:21:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ul_SHA1Transform(uint32_t state[5], const unsigned char buffer[64]);
data/util-linux-2.36.1/include/sha1.h:24:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ul_SHA1Final(unsigned char digest[UL_SHA1LENGTH], UL_SHA1_CTX *context);
data/util-linux-2.36.1/include/strutils.h:82:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, src, bytes);
data/util-linux-2.36.1/include/strutils.h:91:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, src, n);
data/util-linux-2.36.1/include/strutils.h:115:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str, newstr, nsz + 1);
data/util-linux-2.36.1/include/swapheader.h:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	      bootbits[1024];    /* Space for disklabel etc. */
data/util-linux-2.36.1/include/swapheader.h:17:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char uuid[SWAP_UUID_LENGTH];
data/util-linux-2.36.1/include/swapheader.h:18:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	      volume_name[SWAP_LABEL_LENGTH];
data/util-linux-2.36.1/lib/blkdev.c:265:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(name, oflag | O_EXCL);
data/util-linux-2.36.1/lib/blkdev.c:267:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(name, oflag);
data/util-linux-2.36.1/lib/blkdev.c:433:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(argv[1], O_RDONLY|O_CLOEXEC)) < 0)
data/util-linux-2.36.1/lib/canonicalize.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	path[256], name[sizeof(path) - sizeof(_PATH_DEV_MAPPER)], *res = NULL;
data/util-linux-2.36.1/lib/canonicalize.c:42:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(f = fopen(path, "r" UL_CLOEXECSTR)))
data/util-linux-2.36.1/lib/canonicalize.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cwd[PATH_MAX], *res, *p;
data/util-linux-2.36.1/lib/canonicalize.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, cwd, csz);
data/util-linux-2.36.1/lib/canonicalize.c:116:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, path, psz + 1);
data/util-linux-2.36.1/lib/caputils.c:32:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_PROC_CAPLASTCAP, "r");
data/util-linux-2.36.1/lib/colors.c:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sfile[PATH_MAX] = { '\0' };
data/util-linux-2.36.1/lib/colors.c:575:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *dirname, buf[PATH_MAX];
data/util-linux-2.36.1/lib/colors.c:596:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ],
data/util-linux-2.36.1/lib/colors.c:609:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(cc->sfile, "r");
data/util-linux-2.36.1/lib/cpuset.c:358:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ncpus = atoi(optarg);
data/util-linux-2.36.1/lib/env.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char copy[32];
data/util-linux-2.36.1/lib/fileutils.c:25:7:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	fd = mkstemp(template);
data/util-linux-2.36.1/lib/idcache.c:61:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t wc[LOGIN_NAME_MAX + 1];
data/util-linux-2.36.1/lib/ismounted.c:165:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(TEST_FILE, O_RDWR|O_CREAT|O_CLOEXEC, 0600);
data/util-linux-2.36.1/lib/ismounted.c:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[1024], *cp;
data/util-linux-2.36.1/lib/ismounted.c:270:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(f = fopen("/proc/swaps", "r" UL_CLOEXECSTR)))
data/util-linux-2.36.1/lib/ismounted.c:350:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(device, O_RDONLY|O_EXCL|O_CLOEXEC);
data/util-linux-2.36.1/lib/ismounted.c:377:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[PATH_MAX];
data/util-linux-2.36.1/lib/linux_version.c:43:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int x = atoi(argv[2]),
data/util-linux-2.36.1/lib/linux_version.c:44:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    y = atoi(argv[3]),
data/util-linux-2.36.1/lib/linux_version.c:45:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    z = atoi(argv[4]);
data/util-linux-2.36.1/lib/loopdev.c:167:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lc, &dummy, sizeof(dummy));
data/util-linux-2.36.1/lib/loopdev.c:281:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		lc->fd = open(lc->device, lc->mode | O_CLOEXEC);
data/util-linux-2.36.1/lib/loopdev.c:488:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/lib/loopdev.c:493:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		iter->proc = fopen(_PATH_PROC_PARTITIONS, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/lib/loopdev.c:499:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[128 + 1];
data/util-linux-2.36.1/lib/loopdev.c:538:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[NAME_MAX + 18 + 1];
data/util-linux-2.36.1/lib/loopdev.c:601:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[16];
data/util-linux-2.36.1/lib/loopdev.c:620:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[16];
data/util-linux-2.36.1/lib/loopdev.c:914:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("/sys/module/loop/parameters/max_part", "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/lib/loopdev.c:1290:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((file_fd = open(lc->filename, mode | O_CLOEXEC)) < 0) {
data/util-linux-2.36.1/lib/loopdev.c:1292:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			file_fd = open(lc->filename, mode = O_RDONLY);
data/util-linux-2.36.1/lib/loopdev.c:1526:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ctl = open(_PATH_DEV_LOOPCTL, O_RDWR|O_CLOEXEC);
data/util-linux-2.36.1/lib/loopdev.c:1555:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ctl = open(_PATH_DEV_LOOPCTL, O_RDWR|O_CLOEXEC);
data/util-linux-2.36.1/lib/loopdev.c:1559:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[16];
data/util-linux-2.36.1/lib/mbsalign.c:197:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(r, "\\x%02x", (unsigned char) *p);
data/util-linux-2.36.1/lib/mbsalign.c:217:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(r, "\\x%02x", (unsigned char) *p);
data/util-linux-2.36.1/lib/mbsalign.c:227:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(r, "\\x%02x", (unsigned char) p[i]);
data/util-linux-2.36.1/lib/mbsalign.c:232:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(r, p, len);
data/util-linux-2.36.1/lib/mbsalign.c:240:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(r, "\\x%02x", (unsigned char) *p);
data/util-linux-2.36.1/lib/mbsalign.c:296:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(r, "\\x%02x", (unsigned char) *p);
data/util-linux-2.36.1/lib/mbsalign.c:304:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(r, "\\x%02x", (unsigned char) *p);
data/util-linux-2.36.1/lib/mbsalign.c:308:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(r, p, len);
data/util-linux-2.36.1/lib/mbsedit.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char in_buf[MB_CUR_MAX];
data/util-linux-2.36.1/lib/mbsedit.c:172:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str, in, n);
data/util-linux-2.36.1/lib/md5.c:82:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(p, buf, len);
data/util-linux-2.36.1/lib/md5.c:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, buf, t);
data/util-linux-2.36.1/lib/md5.c:94:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->in, buf, 64);
data/util-linux-2.36.1/lib/md5.c:103:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->in, buf, len);
data/util-linux-2.36.1/lib/md5.c:110:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ul_MD5Final(unsigned char digest[UL_MD5LENGTH], struct UL_MD5Context *ctx)
data/util-linux-2.36.1/lib/md5.c:145:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ctx->in[14 * sizeof(uint32_t)], &ctx->bits[0], 4);
data/util-linux-2.36.1/lib/md5.c:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ctx->in[15 * sizeof(uint32_t)], &ctx->bits[1], 4);
data/util-linux-2.36.1/lib/md5.c:150:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(digest, ctx->buf, UL_MD5LENGTH);
data/util-linux-2.36.1/lib/pager.c:196:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open(s, O_RDONLY|O_CLOEXEC);
data/util-linux-2.36.1/lib/path.c:223:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		pc->dir_fd = open(path, O_RDONLY|O_CLOEXEC);
data/util-linux-2.36.1/lib/path.c:373:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(path, flags);
data/util-linux-2.36.1/lib/path.c:624:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/lib/path.c:879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(stringify_value(LLONG_MAX))];
data/util-linux-2.36.1/lib/path.c:901:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(stringify_value(ULLONG_MAX))];
data/util-linux-2.36.1/lib/path.c:967:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/util-linux-2.36.1/lib/path.c:972:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		return fopen(path, mode);
data/util-linux-2.36.1/lib/path.c:977:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return fopen(buf, mode);
data/util-linux-2.36.1/lib/path.c:985:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[len];
data/util-linux-2.36.1/lib/path.c:1203:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char res[PATH_MAX];
data/util-linux-2.36.1/lib/procutils.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/lib/procutils.c:35:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(path, "/proc/%d/task/", pid);
data/util-linux-2.36.1/lib/procutils.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ], *res = NULL;
data/util-linux-2.36.1/lib/procutils.c:104:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(buf, O_RDONLY);
data/util-linux-2.36.1/lib/procutils.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[BUFSIZ], *p;
data/util-linux-2.36.1/lib/procutils.c:205:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char procname[256];
data/util-linux-2.36.1/lib/procutils.c:276:44:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		proc_processes_filter_by_uid(ps, (uid_t) atol(argv[2]));
data/util-linux-2.36.1/lib/pty-session.c:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/lib/randutils.c:85:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/urandom", O_RDONLY | O_CLOEXEC);
data/util-linux-2.36.1/lib/randutils.c:87:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open("/dev/random", O_RDONLY | O_NONBLOCK | O_CLOEXEC);
data/util-linux-2.36.1/lib/randutils.c:215:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	n = argc == 1 ? 16 : atoi(argv[1]);
data/util-linux-2.36.1/lib/setproctitle.c:56:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[SPT_BUFSIZE];
data/util-linux-2.36.1/lib/sha1.c:41:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ul_SHA1Transform(uint32_t state[5], const unsigned char buffer[64])
data/util-linux-2.36.1/lib/sha1.c:46:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char c[64];
data/util-linux-2.36.1/lib/sha1.c:53:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(block, buffer, 64);
data/util-linux-2.36.1/lib/sha1.c:189:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&context->buffer[j], data, (i = 64 - j));
data/util-linux-2.36.1/lib/sha1.c:197:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&context->buffer[j], &data[i], len - i);
data/util-linux-2.36.1/lib/sha1.c:202:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ul_SHA1Final(unsigned char digest[20], UL_SHA1_CTX *context)
data/util-linux-2.36.1/lib/sha1.c:206:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char finalcount[8];
data/util-linux-2.36.1/lib/strutils.c:283:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    return ((char *)memcpy(dest, src, n)) + n;
data/util-linux-2.36.1/lib/strutils.c:318:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return (char *) memcpy(new, s, len);
data/util-linux-2.36.1/lib/strutils.c:586:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/util-linux-2.36.1/lib/strutils.c:590:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char suffix[sizeof(" KiB")], *psuf = suffix;
data/util-linux-2.36.1/lib/strutils.c:942:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(r, s, a);
data/util-linux-2.36.1/lib/strutils.c:943:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(r + a, suffix, b);
data/util-linux-2.36.1/lib/strutils.c:1009:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char quotechars[2] = {*current, '\0'};
data/util-linux-2.36.1/lib/sysfs.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(_PATH_SYS_DEVBLOCK)
data/util-linux-2.36.1/lib/sysfs.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link[PATH_MAX];
data/util-linux-2.36.1/lib/sysfs.c:199:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, name, sz + 1);
data/util-linux-2.36.1/lib/sysfs.c:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[NAME_MAX + 6 + 1];
data/util-linux-2.36.1/lib/sysfs.c:358:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(chain + len, SUBSYSTEM_LINKNAME, sizeof(SUBSYSTEM_LINKNAME));
data/util-linux-2.36.1/lib/sysfs.c:404:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, prefix, psz);
data/util-linux-2.36.1/lib/sysfs.c:406:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf + psz, _PATH_SYS_DEVBLOCK "/", sizeof(_PATH_SYS_DEVBLOCK "/") - 1);
data/util-linux-2.36.1/lib/sysfs.c:419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char subbuf[PATH_MAX];
data/util-linux-2.36.1/lib/sysfs.c:458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX], *chain, *sub;
data/util-linux-2.36.1/lib/sysfs.c:566:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char linkpath[PATH_MAX];
data/util-linux-2.36.1/lib/sysfs.c:669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX], *hctl;
data/util-linux-2.36.1/lib/sysfs.c:742:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/util-linux-2.36.1/lib/sysfs.c:750:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(f = fopen(buf, "r" UL_CLOEXECSTR)))
data/util-linux-2.36.1/lib/sysfs.c:761:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/util-linux-2.36.1/lib/sysfs.c:797:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/lib/sysfs.c:808:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX], linkc[PATH_MAX];
data/util-linux-2.36.1/lib/sysfs.c:832:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/lib/sysfs.c:844:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/util-linux-2.36.1/lib/sysfs.c:863:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(buf, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/lib/sysfs.c:876:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/util-linux-2.36.1/lib/sysfs.c:972:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, "/dev/", 5);
data/util-linux-2.36.1/lib/sysfs.c:1020:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[PATH_MAX + 1];
data/util-linux-2.36.1/lib/sysfs.c:1040:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX], *sub, *chain;
data/util-linux-2.36.1/lib/sysfs.c:1041:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char diskname[32];
data/util-linux-2.36.1/lib/timeutils.c:576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ISO_BUFSIZ];
data/util-linux-2.36.1/libblkid/src/config.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/libblkid/src/config.c:133:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/libblkid/src/devname.c:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		path[NAME_MAX + 18 + 1];
data/util-linux-2.36.1/libblkid/src/devname.c:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char device[256];
data/util-linux-2.36.1/libblkid/src/devname.c:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/util-linux-2.36.1/libblkid/src/devname.c:290:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((lvf = fopen(lvm_device, "r" UL_CLOEXECSTR)) == NULL) {
data/util-linux-2.36.1/libblkid/src/devname.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[100];
data/util-linux-2.36.1/libblkid/src/devname.c:376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device[110];
data/util-linux-2.36.1/libblkid/src/devname.c:378:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	procpt = fopen(PROC_EVMS_VOLUMES, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/libblkid/src/devname.c:450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/util-linux-2.36.1/libblkid/src/devname.c:451:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ptname0[128 + 1], ptname1[128 + 1], *ptname = NULL;
data/util-linux-2.36.1/libblkid/src/devname.c:452:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ptnames[2];
data/util-linux-2.36.1/libblkid/src/devname.c:478:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	proc = fopen(PROC_PARTITIONS, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/libblkid/src/devno.c:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, a, al);
data/util-linux-2.36.1/libblkid/src/devno.c:59:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, b, bl);
data/util-linux-2.36.1/libblkid/src/devno.c:63:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, c, cl);
data/util-linux-2.36.1/libblkid/src/devno.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/util-linux-2.36.1/libblkid/src/devno.c:295:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/util-linux-2.36.1/libblkid/src/devno.c:298:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_PROC_DEVICES, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/libblkid/src/devno.c:309:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[64 + 1];
data/util-linux-2.36.1/libblkid/src/devno.c:331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	diskname[PATH_MAX];
data/util-linux-2.36.1/libblkid/src/encode.c:262:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&str_enc[j], &str[i], seqlen);
data/util-linux-2.36.1/libblkid/src/encode.c:268:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(&str_enc[j], "\\x%02x", (unsigned char) str[i]);
data/util-linux-2.36.1/libblkid/src/evaluate.c:76:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(devname, O_RDONLY|O_CLOEXEC|O_NONBLOCK);
data/util-linux-2.36.1/libblkid/src/evaluate.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uevent[PATH_MAX];
data/util-linux-2.36.1/libblkid/src/evaluate.c:125:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(uevent, "w" UL_CLOEXECSTR);
data/util-linux-2.36.1/libblkid/src/evaluate.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev[PATH_MAX];
data/util-linux-2.36.1/libblkid/src/partitions/atari.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[3];
data/util-linux-2.36.1/libblkid/src/partitions/atari.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused0[0x156]; /* boot code */
data/util-linux-2.36.1/libblkid/src/partitions/atari.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused1[0xc];
data/util-linux-2.36.1/libblkid/src/partitions/dos.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idstr[UUID_STR_LEN];
data/util-linux-2.36.1/libblkid/src/partitions/gpt.c:284:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr, h, sizeof(*h));
data/util-linux-2.36.1/libblkid/src/partitions/mac.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[32];	/* partition name */
data/util-linux-2.36.1/libblkid/src/partitions/mac.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		type[32];	/* string type description */
data/util-linux-2.36.1/libblkid/src/partitions/mac.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		processor[16];	/* identifies ISA of boot */
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		id[UUID_STR_LEN]; /* PT identifier (e.g. UUID for GPT) */
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		typestr[UUID_STR_LEN]; /* partition type string (GPT and Mac) */
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		uuid[UUID_STR_LEN]; /* UUID (when supported by PT), e.g GPT */
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:188:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	name[128];	/* Partition in UTF8 name (when supported by PT), e.g. Mac */
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:1338:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(item, data, len);
data/util-linux-2.36.1/libblkid/src/partitions/solaris_x86.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char         v_volume[8];       /* volume name */
data/util-linux-2.36.1/libblkid/src/partitions/solaris_x86.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char         v_asciilabel[128];	/* for compatibility */
data/util-linux-2.36.1/libblkid/src/partitions/unixware.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		d_serial[12];	/* serial number of the device */
data/util-linux-2.36.1/libblkid/src/partitions/unixware.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		v_name[8];	/* volume name */
data/util-linux-2.36.1/libblkid/src/probe.c:206:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDONLY|O_CLOEXEC|O_NONBLOCK);
data/util-linux-2.36.1/libblkid/src/probe.c:796:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[512];
data/util-linux-2.36.1/libblkid/src/probe.c:1194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/libblkid/src/probe.c:1496:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(v->data, data, len);
data/util-linux-2.36.1/libblkid/src/read.c:366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/util-linux-2.36.1/libblkid/src/read.c:374:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(cache->bic_filename, O_RDONLY|O_CLOEXEC)) < 0)
data/util-linux-2.36.1/libblkid/src/save.c:147:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(filename, "w" UL_CLOEXECSTR);
data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[B_OS_NAME_LENGTH];
data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[0];
data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[0];
data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:408:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(uuid,
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:21:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*   0 */ unsigned char	boot_entry_point[3];
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:22:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*   3 */ unsigned char	fs_signature[8];
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:23:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*  11 */ unsigned char	__dummy1[67 - 11];
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:25:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*  71 */ unsigned char volume_label[11];	/* "NO NAME\x20\x20\x20\x20" only */
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:26:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*  82 */ unsigned char __dummy2[160 - 82];
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:27:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 160 */ unsigned char guid[16];		/* BitLocker specific GUID */
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:33:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*   0 */ unsigned char	boot_entry_point[3];
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:34:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*   3 */ unsigned char	fs_signature[8];
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:35:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*  11 */ unsigned char	__dummy[424 - 11];
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:36:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 424 */ unsigned char guid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/bitlocker.c:42:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*   0 */ unsigned char  signature[8];
data/util-linux-2.36.1/libblkid/src/superblocks/ddf_raid.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ddf_rev[8];	/* 01.02.00 */
data/util-linux-2.36.1/libblkid/src/superblocks/ddf_raid.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[DDF_REV_LENGTH + 1];
data/util-linux-2.36.1/libblkid/src/superblocks/ddf_raid.c:122:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(version, ddf->ddf_rev, sizeof(ddf->ddf_rev));
data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char magic[11];
data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char uuid[32];
data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/util-linux-2.36.1/libblkid/src/superblocks/drbdmanage.c:38:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char persistence_magic[4] = { '\x1a', '\xdb', '\x98', '\xa2' };
data/util-linux-2.36.1/libblkid/src/superblocks/drbdproxy_datalog.c:23:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char uuid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/exfs.c:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	sb_uuid[16];	/* file system unique id */
data/util-linux-2.36.1/libblkid/src/superblocks/exfs.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sb_fname[12];	/* file system name */
data/util-linux-2.36.1/libblkid/src/superblocks/ext.c:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		s_magic[2];
data/util-linux-2.36.1/libblkid/src/superblocks/ext.c:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		s_uuid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/ext.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			s_volume_name[16];
data/util-linux-2.36.1/libblkid/src/superblocks/ext.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			s_last_mounted[64];
data/util-linux-2.36.1/libblkid/src/superblocks/gfs.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sb_lockproto[GFS_LOCKNAME_LEN];
data/util-linux-2.36.1/libblkid/src/superblocks/gfs.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sb_locktable[GFS_LOCKNAME_LEN];
data/util-linux-2.36.1/libblkid/src/superblocks/hfs.c:135:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char const hash_init[UL_MD5LENGTH] = {
data/util-linux-2.36.1/libblkid/src/superblocks/hfs.c:139:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char uuid[UL_MD5LENGTH];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:24:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char year[4];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:25:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char month[2];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:26:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char day[2];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hour[2];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char minute[2];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char second[2];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hundredth[2];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	vd_id[5];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	system_id[32];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:41:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	volume_id[32];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	unused[8];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	space_size[8];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:44:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	escape_sequences[8];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:45:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  unused1[222];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  publisher_id[128];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  unused2[128];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  application_id[128];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  unused3[111];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	vd_id[5];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	boot_system_id[32];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	boot_id[32];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:61:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	unused[1];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	foo[8];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:75:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	id[5];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:78:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	system_id[32];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   volume_id[32];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:112:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buffer[16];
data/util-linux-2.36.1/libblkid/src/superblocks/iso9660.c:172:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char label[32];
data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	js_magic[4];
data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c:32:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	js_uuid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c:33:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	js_label[16];
data/util-linux-2.36.1/libblkid/src/superblocks/jfs.c:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	js_loguuid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/linux_raid.c:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	set_name[32];	/* set and interpreted by user-space */
data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		magic[LUKS_MAGIC_L];
data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		label[LUKS2_LABEL_L];
data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		checksum_alg[LUKS2_CHECKSUM_ALG_L];
data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		uuid[UUID_STRING_L];
data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		subsystem[LUKS2_LABEL_L]; /* owner subsystem label */
data/util-linux-2.36.1/libblkid/src/superblocks/luks.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		_padding[184];
data/util-linux-2.36.1/libblkid/src/superblocks/lvm.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid[LVM2_ID_LEN + 7];
data/util-linux-2.36.1/libblkid/src/superblocks/lvm.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid[LVM2_ID_LEN + 7];
data/util-linux-2.36.1/libblkid/src/superblocks/mpool.c:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   osb_poolid[16]; /* UUID of pool this drive belongs to */
data/util-linux-2.36.1/libblkid/src/superblocks/nilfs.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		s_volume_name[80];
data/util-linux-2.36.1/libblkid/src/superblocks/nilfs.c:72:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char sum[4];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:18:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	minor_version[4];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:19:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	major_version[4];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:20:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	signature[128];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		mount[128];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:22:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   mount_len[2];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:26:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	disk_lock[48];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		label[64];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	label_len[2];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   vol_id[16];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   vol_id_len[2];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dummy[32];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dl_tag[8];
data/util-linux-2.36.1/libblkid/src/superblocks/ocfs.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dl_id[24];
data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	rs_magic[12];
data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	rs_uuid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rs_label[16];
data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	rs4_magic[16];
data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	rs4_uuid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/reiserfs.c:38:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	rs4_label[16];
data/util-linux-2.36.1/libblkid/src/superblocks/romfs.c:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ros_magic[8];
data/util-linux-2.36.1/libblkid/src/superblocks/romfs.c:23:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ros_volume[16];
data/util-linux-2.36.1/libblkid/src/superblocks/silicon_raid.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&val, ptr, sizeof(uint16_t));
data/util-linux-2.36.1/libblkid/src/superblocks/swap.c:27:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	uuid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/swap.c:28:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	volume[16];
data/util-linux-2.36.1/libblkid/src/superblocks/udf.c:73:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		domain_id[23];
data/util-linux-2.36.1/libblkid/src/superblocks/udf.c:126:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline int gen_uuid_from_volset_id(unsigned char uuid[17], struct dstring128 *volset_id)
data/util-linux-2.36.1/libblkid/src/superblocks/udf.c:133:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[17];
data/util-linux-2.36.1/libblkid/src/superblocks/udf.c:344:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char uuid[17];
data/util-linux-2.36.1/libblkid/src/superblocks/vdo.c:19:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[8];			/* magic number 'dmvdo001'*/
data/util-linux-2.36.1/libblkid/src/superblocks/vdo.c:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unused[32];		/* 32 bytes of unimportant space */
data/util-linux-2.36.1/libblkid/src/superblocks/vdo.c:21:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sb_uuid[16];	/* vdo unique id */
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:25:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 00*/	unsigned char	vs_ignored[3];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:26:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 03*/	unsigned char	vs_sysid[8];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:27:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 0b*/	unsigned char	vs_sector_size[2];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:31:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 11*/	unsigned char	vs_dir_entries[2];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:32:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 13*/	unsigned char	vs_sectors[2];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:46:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 40*/	unsigned char	vs_unknown[3];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:47:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 43*/	unsigned char	vs_serno[4];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:48:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 47*/	unsigned char	vs_label[11];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:49:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 52*/	unsigned char   vs_magic[8];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:50:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 5a*/	unsigned char	vs_dummy2[0x1fe - 0x5a];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:51:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*1fe*/	unsigned char	vs_pmagic[2];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:56:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 00*/	unsigned char	ms_ignored[3];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:57:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 03*/	unsigned char	ms_sysid[8];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:58:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 0b*/	unsigned char	ms_sector_size[2];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:62:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 11*/	unsigned char	ms_dir_entries[2];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:63:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 13*/	unsigned char	ms_sectors[2]; /* =0 iff V3 or later */
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:72:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 24*/	unsigned char	ms_unknown[3]; /* Phys drive no., resvd, V4 sig (0x29) */
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:73:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 27*/	unsigned char	ms_serno[4];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:74:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 2b*/	unsigned char	ms_label[11];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:75:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 36*/	unsigned char   ms_magic[8];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:76:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/* 3e*/	unsigned char	ms_dummy2[0x1fe - 0x3e];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:77:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
/*1fe*/	unsigned char	ms_pmagic[2];
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:117:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		(((unsigned char *) x)[0] + (((unsigned char *) x)[1] << 8))
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:117:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		(((unsigned char *) x)[0] + (((unsigned char *) x)[1] << 8))
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:341:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(vol_label_buf, vol_label, 11);
data/util-linux-2.36.1/libblkid/src/superblocks/vfat.c:381:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(vol_label_buf, vol_label, 11);
data/util-linux-2.36.1/libblkid/src/superblocks/vmfs.c:15:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[128];
data/util-linux-2.36.1/libblkid/src/superblocks/xfs.c:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	sb_uuid[16];	/* file system unique id */
data/util-linux-2.36.1/libblkid/src/superblocks/xfs.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sb_fname[12];	/* file system name */
data/util-linux-2.36.1/libblkid/src/superblocks/xfs.c:199:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	h_uuid[16];
data/util-linux-2.36.1/libblkid/src/superblocks/zfs.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		nvp_name[0]; /* aligned to 4 bytes */
data/util-linux-2.36.1/libblkid/src/superblocks/zfs.c:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	nvs_string[0];
data/util-linux-2.36.1/libblkid/src/superblocks/zonefs.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		s_label[ZONEFS_LABEL_SIZE];
data/util-linux-2.36.1/libblkid/src/topology/dm.c:67:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *dmargv[7];
data/util-linux-2.36.1/libblkid/src/topology/dm.c:68:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	        char maj[16], min[16];
data/util-linux-2.36.1/libblkid/src/topology/lvm.c:57:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			cmd = (char *) paths[i];
data/util-linux-2.36.1/libblkid/src/topology/lvm.c:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *lvargv[3];
data/util-linux-2.36.1/libblkid/src/topology/md.c:100:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(diskpath, O_RDONLY|O_CLOEXEC);
data/util-linux-2.36.1/libblkid/src/topology/topology.c:220:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *) chn->data + structoff, &data, sizeof(data));
data/util-linux-2.36.1/libblkid/src/verify.c:129:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev->bid_name, O_RDONLY|O_CLOEXEC|O_NONBLOCK);
data/util-linux-2.36.1/libfdisk/src/ask.c:450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char range[BUFSIZ], *ptr = range;
data/util-linux-2.36.1/libfdisk/src/ask.c:1039:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char range[BUFSIZ], *ptr = range;
data/util-linux-2.36.1/libfdisk/src/bsd.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bsdbuffer[BSD_BBSIZE] __attribute__((aligned(8)));
data/util-linux-2.36.1/libfdisk/src/bsd.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bsdbuffer[BSD_BBSIZE];
data/util-linux-2.36.1/libfdisk/src/bsd.c:641:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(path, O_RDONLY)) < 0) {
data/util-linux-2.36.1/libfdisk/src/bsd.c:668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/libfdisk/src/bsd.c:749:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&val, ptr, sizeof(unsigned short));
data/util-linux-2.36.1/libfdisk/src/context.c:679:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, (readonly ? O_RDONLY : O_RDWR ) | O_CLOEXEC);
data/util-linux-2.36.1/libfdisk/src/dos.c:1883:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hint[BUFSIZ];
data/util-linux-2.36.1/libfdisk/src/dos.c:2018:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char empty[512] = { 0 };
data/util-linux-2.36.1/libfdisk/src/gpt.c:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[UUID_STR_LEN];
data/util-linux-2.36.1/libfdisk/src/gpt.c:469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[UUID_STR_LEN];
data/util-linux-2.36.1/libfdisk/src/gpt.c:671:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&header->disk_guid,
data/util-linux-2.36.1/libfdisk/src/gpt.c:705:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&res->disk_guid, &src->disk_guid, sizeof(src->disk_guid));
data/util-linux-2.36.1/libfdisk/src/gpt.c:1721:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, GPT_ATTRSTR_REQ, (l = sizeof(GPT_ATTRSTR_REQ)));
data/util-linux-2.36.1/libfdisk/src/gpt.c:1727:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, GPT_ATTRSTR_NOBLOCK, (l = sizeof(GPT_ATTRSTR_NOBLOCK)));
data/util-linux-2.36.1/libfdisk/src/gpt.c:1733:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, GPT_ATTRSTR_LEGACY, (l = sizeof(GPT_ATTRSTR_LEGACY)));
data/util-linux-2.36.1/libfdisk/src/gpt.c:1745:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			p += sprintf(p, "GUID:%u", n);
data/util-linux-2.36.1/libfdisk/src/gpt.c:1747:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			p += sprintf(p, ",%u", n);
data/util-linux-2.36.1/libfdisk/src/gpt.c:1841:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char u_str[UUID_STR_LEN];
data/util-linux-2.36.1/libfdisk/src/gpt.c:1911:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char new_u[UUID_STR_LEN], old_u[UUID_STR_LEN];
data/util-linux-2.36.1/libfdisk/src/gpt.c:2577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[UUID_STR_LEN];
data/util-linux-2.36.1/libfdisk/src/partition.c:90:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(n, o, sizeof(*n));
data/util-linux-2.36.1/libfdisk/src/script.c:122:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/util-linux-2.36.1/libfdisk/src/script.c:452:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/util-linux-2.36.1/libfdisk/src/script.c:1394:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ] = { '\0' };
data/util-linux-2.36.1/libfdisk/src/script.c:1588:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(f = fopen(filename, "r")))
data/util-linux-2.36.1/libfdisk/src/script.c:1606:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ] = { '\0' };
data/util-linux-2.36.1/libfdisk/src/sgi.c:107:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  scsi_string[50];
data/util-linux-2.36.1/libfdisk/src/sgi.c:108:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  serial[137];
data/util-linux-2.36.1/libfdisk/src/sgi.c:110:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char  installer[225];
data/util-linux-2.36.1/libfdisk/src/sgi.c:126:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy((char *) info->scsi_string, "IBM OEM 0662S12         3 30");
data/util-linux-2.36.1/libfdisk/src/sgi.c:127:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy((char *) info->serial, "0000");
data/util-linux-2.36.1/libfdisk/src/sgi.c:129:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy((char *) info->installer, "Sfx version 5.3, Oct 18, 1994");
data/util-linux-2.36.1/libfdisk/src/sgi.c:156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char *) sgilabel->volume[0].name, "sgilabel", 8);
data/util-linux-2.36.1/libfdisk/src/sgi.c:458:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sgilabel->boot_file, name, sz);
data/util-linux-2.36.1/libfdisk/src/sgi.c:820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mesg[256];
data/util-linux-2.36.1/libfdisk/src/sgi.c:1011:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy((char *) sgilabel->boot_file, "/unix");
data/util-linux-2.36.1/libfdisk/src/sun.c:514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mesg[256];
data/util-linux-2.36.1/libmount/python/tab.c:166:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(f = fopen(path, "w")))
data/util-linux-2.36.1/libmount/src/cache.c:231:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key, tagname, tksz + 1);	   /* include '\0' */
data/util-linux-2.36.1/libmount/src/cache.c:232:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key + tksz + 1, tagval, vlsz + 1);
data/util-linux-2.36.1/libmount/src/cache.c:732:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[BUFSIZ];
data/util-linux-2.36.1/libmount/src/cache.c:755:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[BUFSIZ];
data/util-linux-2.36.1/libmount/src/cache.c:778:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[BUFSIZ];
data/util-linux-2.36.1/libmount/src/context.c:2121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char helper[PATH_MAX];
data/util-linux-2.36.1/libmount/src/context.c:3024:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		cxt->ns_orig.fd = open("/proc/self/ns/mnt", O_RDONLY | O_CLOEXEC);
data/util-linux-2.36.1/libmount/src/context.c:3031:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tmp = open(path, O_RDONLY | O_CLOEXEC);
data/util-linux-2.36.1/libmount/src/context_mount.c:645:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *args[14], *type;
data/util-linux-2.36.1/libmount/src/context_umount.c:294:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(tgt, O_PATH);
data/util-linux-2.36.1/libmount/src/context_umount.c:453:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uidstr[sizeof(stringify_value(ULONG_MAX))];
data/util-linux-2.36.1/libmount/src/context_umount.c:690:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *args[12], *type;
data/util-linux-2.36.1/libmount/src/context_veritydev.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[3] = "xx\0", *endp, *bytes;
data/util-linux-2.36.1/libmount/src/context_veritydev.c:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, &hex[i * 2], 2);
data/util-linux-2.36.1/libmount/src/context_veritydev.c:125:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(mapper_device, "libmnt_");
data/util-linux-2.36.1/libmount/src/context_veritydev.c:375:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(mapper_device_full, "/dev/mapper/");
data/util-linux-2.36.1/libmount/src/fs.c:152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*dest, src, sz);
data/util-linux-2.36.1/libmount/src/fs.c:746:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(res, ro ? "ro" : "rw", 3);
data/util-linux-2.36.1/libmount/src/fs.c:748:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(res, ro ? "ro," : "rw,", 3);
data/util-linux-2.36.1/libmount/src/lock.c:160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ml->lockfile + sz - 1, ".lock", 6);
data/util-linux-2.36.1/libmount/src/lock.c:163:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		 memcpy(ml->lockfile + sz - 5, "~", 2);
data/util-linux-2.36.1/libmount/src/lock.c:224:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ml->lockfile_fd = open(lfile, O_RDONLY|O_CREAT|O_CLOEXEC,
data/util-linux-2.36.1/libmount/src/lock.c:427:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	i = open(linkfile, O_WRONLY|O_CREAT|O_CLOEXEC, S_IRUSR|S_IWUSR);
data/util-linux-2.36.1/libmount/src/lock.c:459:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ml->lockfile_fd = open(lockfile, O_WRONLY|O_CLOEXEC);
data/util-linux-2.36.1/libmount/src/lock.c:594:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/util-linux-2.36.1/libmount/src/lock.c:596:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(f = fopen(filename, "r" UL_CLOEXECSTR)))
data/util-linux-2.36.1/libmount/src/lock.c:603:8:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atol(buf) + 1;
data/util-linux-2.36.1/libmount/src/lock.c:605:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(f = fopen(filename, "w" UL_CLOEXECSTR)))
data/util-linux-2.36.1/libmount/src/lock.c:642:23:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		synctime = (time_t) atol(argv[idx + 1]);
data/util-linux-2.36.1/libmount/src/lock.c:653:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		loops = atoi(argv[idx++]);
data/util-linux-2.36.1/libmount/src/monitor.c:314:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(struct inotify_event) + NAME_MAX + 1];
data/util-linux-2.36.1/libmount/src/monitor.c:463:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	me->fd = open(me->path, O_RDONLY|O_CLOEXEC);
data/util-linux-2.36.1/libmount/src/optstr.c:207:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, name, nsz);
data/util-linux-2.36.1/libmount/src/optstr.c:212:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, value, vsz);
data/util-linux-2.36.1/libmount/src/optstr.c:418:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pos, substr, subsz);
data/util-linux-2.36.1/libmount/src/optstr.c:470:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ol.value, value, ol.valsz);
data/util-linux-2.36.1/libmount/src/optstr.c:766:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(next, o, 2);
data/util-linux-2.36.1/libmount/src/optstr.c:931:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, raw, sz);
data/util-linux-2.36.1/libmount/src/optstr.c:950:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[40];
data/util-linux-2.36.1/libmount/src/tab.c:1423:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char subvolidstr[sizeof(stringify_value(UINT64_MAX))];
data/util-linux-2.36.1/libmount/src/tab.c:1428:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(subvolidstr, vol, volsz);
data/util-linux-2.36.1/libmount/src/tab.c:1458:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char default_id_str[sizeof(stringify_value(UINT64_MAX))];
data/util-linux-2.36.1/libmount/src/tab.c:1512:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, vol, volsz);
data/util-linux-2.36.1/libmount/src/tab_parse.c:844:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(filename, O_RDONLY|O_CLOEXEC);
data/util-linux-2.36.1/libmount/src/tab_parse.c:864:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(filename, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/libmount/src/tab_parse.c:907:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dd = open(dirname, O_RDONLY|O_CLOEXEC|O_DIRECTORY);
data/util-linux-2.36.1/libmount/src/utils.c:57:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((*a) + al, b, bl + 1);
data/util-linux-2.36.1/libmount/src/utils.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cwd[PATH_MAX];
data/util-linux-2.36.1/libmount/src/utils.c:200:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(*filename, ".", 2);
data/util-linux-2.36.1/libmount/src/utils.c:533:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[129];
data/util-linux-2.36.1/libmount/src/utils.c:535:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/libmount/src/utils.c:542:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[sizeof(line)];
data/util-linux-2.36.1/libmount/src/utils.c:732:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(filename, O_RDWR|O_CREAT|O_CLOEXEC,
data/util-linux-2.36.1/libmount/src/utils.c:992:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mnt, "/", 2);
data/util-linux-2.36.1/libmount/src/utils.c:1024:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];	/* see kernel include/asm-generic/setup.h: COMMAND_LINE_SIZE */
data/util-linux-2.36.1/libmount/src/utils.c:1035:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/libmount/src/utils.c:1102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/util-linux-2.36.1/libmount/src/utils.c:1309:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int rc = 0, fd = open(filename, O_RDONLY);
data/util-linux-2.36.1/libsmartcols/samples/continuous.c:109:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(timecell, "%f [%3d%%]", diff,
data/util-linux-2.36.1/libsmartcols/samples/fromfile.c:268:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE *f = fopen(optarg, "r");
data/util-linux-2.36.1/libsmartcols/samples/fromfile.c:333:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *f = fopen(argv[optind], "r");
data/util-linux-2.36.1/libsmartcols/samples/tree.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char modbuf[11], *p;
data/util-linux-2.36.1/libsmartcols/samples/tree.c:95:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(name, O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC);
data/util-linux-2.36.1/libsmartcols/samples/wrap.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/libsmartcols/src/buffer.c:65:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf->cur, str, sz + 1);
data/util-linux-2.36.1/libsmartcols/src/line.c:164:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ce, &ln->cells[oldn], sizeof(struct libscols_cell));
data/util-linux-2.36.1/libsmartcols/src/line.c:177:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ln->cells[newn], &ce, sizeof(struct libscols_cell));
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:200:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(node_id, a, 6);
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:238:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		state_fd = open(LIBUUID_CLOCK_FILE, O_RDWR|O_CREAT|O_CLOEXEC, 0660);
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:343:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char op_buf[64];
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:366:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(op_buf+1, num, sizeof(*num));
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:385:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(op_buf+16, num, sizeof(int));
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:387:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, op_buf, 16);
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:408:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char node_id[6];
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:430:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(uu.node, node_id, 6);
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:565:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash[UL_MD5LENGTH];
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:591:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash[UL_SHA1LENGTH];
data/util-linux-2.36.1/libuuid/src/pack.c:67:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out+10, uu->node, 6);
data/util-linux-2.36.1/libuuid/src/parse.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[3];
data/util-linux-2.36.1/libuuid/src/test_uuid.c:52:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char * validStr[2] = {"invalid", "valid"};
data/util-linux-2.36.1/libuuid/src/test_uuid.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[UUID_STR_LEN];
data/util-linux-2.36.1/libuuid/src/test_uuid.c:74:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(file, O_RDONLY)) < 0) {
data/util-linux-2.36.1/libuuid/src/unpack.c:61:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(uu->node, ptr, 6);
data/util-linux-2.36.1/libuuid/src/unparse.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char const hexdigits_lower[16] = "0123456789abcdef";
data/util-linux-2.36.1/libuuid/src/unparse.c:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char const hexdigits_upper[16] = "0123456789ABCDEF";
data/util-linux-2.36.1/libuuid/src/unparse.c:42:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void uuid_fmt(const uuid_t uuid, char *buf, char const fmt[restrict])
data/util-linux-2.36.1/libuuid/src/unparse.c:42:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void uuid_fmt(const uuid_t uuid, char *buf, char const fmt[restrict])
data/util-linux-2.36.1/libuuid/src/uuid.h:44:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char uuid_t[16];
data/util-linux-2.36.1/login-utils/islocal.c:37:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen(filename, "r")))
data/util-linux-2.36.1/login-utils/last.c:179:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[UCHUNKSIZE];
data/util-linux-2.36.1/login-utils/last.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/util-linux-2.36.1/login-utils/last.c:220:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(u, buf + bpos, sizeof(struct utmpx));
data/util-linux-2.36.1/login-utils/last.c:235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp + (-bpos), buf, utsize + bpos);
data/util-linux-2.36.1/login-utils/last.c:253:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, buf + UCHUNKSIZE + bpos, -bpos);
data/util-linux-2.36.1/login-utils/last.c:256:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(u, tmp, sizeof(struct utmpx));
data/util-linux-2.36.1/login-utils/last.c:266:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char s[CTIME_BUFSIZ];
data/util-linux-2.36.1/login-utils/last.c:326:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(sin6.sin6_addr.s6_addr, a, 16);
data/util-linux-2.36.1/login-utils/last.c:353:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[CTIME_BUFSIZ];
data/util-linux-2.36.1/login-utils/last.c:392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		logintime[LAST_TIMESTAMP_LEN];
data/util-linux-2.36.1/login-utils/last.c:393:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		logouttime[LAST_TIMESTAMP_LEN];
data/util-linux-2.36.1/login-utils/last.c:394:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		length[LAST_TIMESTAMP_LEN];
data/util-linux-2.36.1/login-utils/last.c:395:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		final[512];
data/util-linux-2.36.1/login-utils/last.c:396:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		utline[sizeof(p->ut_line) + 1];
data/util-linux-2.36.1/login-utils/last.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		domain[256];
data/util-linux-2.36.1/login-utils/last.c:451:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(logouttime, "- ");
data/util-linux-2.36.1/login-utils/last.c:458:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(logouttime, "  still running");
data/util-linux-2.36.1/login-utils/last.c:461:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(logouttime, "  still");
data/util-linux-2.36.1/login-utils/last.c:462:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(length, "running");
data/util-linux-2.36.1/login-utils/last.c:465:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(length, "(%d+%02d:%02d)", days, abs(hours), abs(mins)); /* hours and mins always shown as positive (w/o minus sign!) even if secs < 0 */
data/util-linux-2.36.1/login-utils/last.c:467:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(length, " (%02d:%02d)", hours, abs(mins));  /* mins always shown as positive (w/o minus sign!) even if secs < 0 */
data/util-linux-2.36.1/login-utils/last.c:469:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(length, " (%02d:%02d)", hours, mins);
data/util-linux-2.36.1/login-utils/last.c:471:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(length, " (-00:%02d)", abs(mins));  /* mins always shown as positive (w/o minus sign!) even if secs < 0 */
data/util-linux-2.36.1/login-utils/last.c:476:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(logouttime, "- crash");
data/util-linux-2.36.1/login-utils/last.c:479:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(logouttime, "- down ");
data/util-linux-2.36.1/login-utils/last.c:483:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(logouttime, "  still logged in");
data/util-linux-2.36.1/login-utils/last.c:486:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(logouttime, "  still");
data/util-linux-2.36.1/login-utils/last.c:487:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(length, "logged in");
data/util-linux-2.36.1/login-utils/last.c:492:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(logouttime, "  gone - no logout");
data/util-linux-2.36.1/login-utils/last.c:495:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(logouttime, "   gone");
data/util-linux-2.36.1/login-utils/last.c:496:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(length, "- no logout");
data/util-linux-2.36.1/login-utils/last.c:499:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(length, "no logout");
data/util-linux-2.36.1/login-utils/last.c:606:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[sizeof(ut->ut_line) + 16];
data/util-linux-2.36.1/login-utils/last.c:620:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (!(f = fopen(path, "r")))
data/util-linux-2.36.1/login-utils/last.c:629:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char utline[sizeof(ut->ut_line) + 1];
data/util-linux-2.36.1/login-utils/last.c:678:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(filename, "r")) == NULL)
data/util-linux-2.36.1/login-utils/last.c:768:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(ut.ut_line, "system down");
data/util-linux-2.36.1/login-utils/last.c:784:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(ut.ut_line, "system boot");
data/util-linux-2.36.1/login-utils/last.c:792:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(ut.ut_line, "(to lvl %c)", x);
data/util-linux-2.36.1/login-utils/last.c:852:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&p->ut, &ut, sizeof(struct utmpx));
data/util-linux-2.36.1/login-utils/last.c:891:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char timestr[LAST_TIMESTAMP_LEN];
data/util-linux-2.36.1/login-utils/login.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		vcsn[VCS_PATH_MAX];	/* virtual console name */
data/util-linux-2.36.1/login-utils/login.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		vcsan[VCS_PATH_MAX];
data/util-linux-2.36.1/login-utils/login.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hostaddress[16];	/* remote address */
data/util-linux-2.36.1/login-utils/login.c:152:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char timeout_msg[128];
data/util-linux-2.36.1/login-utils/login.c:274:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dd = open(dirname, O_RDONLY|O_CLOEXEC|O_DIRECTORY);
data/util-linux-2.36.1/login-utils/login.c:337:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			int fd = open(file, O_RDONLY, 0);
data/util-linux-2.36.1/login-utils/login.c:365:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(tty, O_RDWR | O_NONBLOCK);
data/util-linux-2.36.1/login-utils/login.c:589:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_LASTLOG, O_RDWR, 0);
data/util-linux-2.36.1/login-utils/login.c:600:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char time_string[CTIME_BUFSIZ];
data/util-linux-2.36.1/login-utils/login.c:1082:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PATH_MAX];
data/util-linux-2.36.1/login-utils/login.c:1153:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cxt->hostaddress, &(sa->sin_addr), sizeof(sa->sin_addr));
data/util-linux-2.36.1/login-utils/login.c:1163:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cxt->hostaddress, &addr, sizeof(struct in_addr));
data/util-linux-2.36.1/login-utils/login.c:1166:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cxt->hostaddress, &(sa->sin6_addr), sizeof(sa->sin6_addr));
data/util-linux-2.36.1/login-utils/login.c:1193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *childArgv[10];
data/util-linux-2.36.1/login-utils/login.c:1432:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tbuf[PATH_MAX + 2], *p;
data/util-linux-2.36.1/login-utils/logindefs.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/login-utils/logindefs.c:100:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/util-linux-2.36.1/login-utils/logindefs.c:435:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(path, mode);
data/util-linux-2.36.1/login-utils/logindefs.c:475:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/login-utils/logindefs.c:503:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(file, "r");
data/util-linux-2.36.1/login-utils/lslogins.c:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64] = {0};
data/util-linux-2.36.1/login-utils/lslogins.c:1642:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ctl->lastlogin_fd = open(path_lastlog, O_RDONLY, 0);
data/util-linux-2.36.1/login-utils/newgrp.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/login-utils/newgrp.c:94:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_GSHADOW, "r");
data/util-linux-2.36.1/login-utils/nologin.c:92:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_NOLOGIN_TXT, O_RDONLY);
data/util-linux-2.36.1/login-utils/nologin.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[BUFSIZ];
data/util-linux-2.36.1/login-utils/setpwnam.c:97:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	pwf = fopen(PASSWD_FILE, "r");
data/util-linux-2.36.1/login-utils/su-common.c:818:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(args + argno, additional_args, n_additional_args * sizeof *args);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:163:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(fp = fopen(file, "r" UL_CLOEXECSTR)))
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:357:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[16 + 1];
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:364:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fc = fopen("/proc/consoles", "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:505:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fd = open(name, O_RDWR|O_NONBLOCK|O_NOCTTY|O_CLOEXEC)) < 0) {
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:567:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(device, O_RDWR|O_NONBLOCK|O_NOCTTY|O_CLOEXEC);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:632:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(device, O_RDWR|O_NONBLOCK|O_NOCTTY|O_CLOEXEC);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:809:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(name, O_RDWR);
data/util-linux-2.36.1/login-utils/sulogin.c:324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[5];
data/util-linux-2.36.1/login-utils/sulogin.c:414:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char line[2 * BUFSIZ];
data/util-linux-2.36.1/login-utils/sulogin.c:415:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char sline[2 * BUFSIZ];
data/util-linux-2.36.1/login-utils/sulogin.c:443:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(_PATH_PASSWD, "r")) == NULL) {
data/util-linux-2.36.1/login-utils/sulogin.c:480:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(_PATH_SHADOW_PASSWD, "r")) == NULL) {
data/util-linux-2.36.1/login-utils/sulogin.c:609:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char pass[128], *ptr;
data/util-linux-2.36.1/login-utils/sulogin.c:722:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shell[PATH_MAX];
data/util-linux-2.36.1/login-utils/sulogin.c:723:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char home[PATH_MAX];
data/util-linux-2.36.1/login-utils/sulogin.c:953:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((con->fd = open(con->tty, O_RDWR | O_NOCTTY | O_NONBLOCK)) < 0)
data/util-linux-2.36.1/login-utils/utmpdump.c:78:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return (suseconds_t) atoi(s + 1);
data/util-linux-2.36.1/login-utils/utmpdump.c:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[INET6_ADDRSTRLEN];
data/util-linux-2.36.1/login-utils/utmpdump.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char time_string[40];
data/util-linux-2.36.1/login-utils/utmpdump.c:133:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(in = fopen(filename, "r")))
data/util-linux-2.36.1/login-utils/utmpdump.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[NEVENTS * sizeof(struct inotify_event)];
data/util-linux-2.36.1/login-utils/utmpdump.c:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s_addr[INET6_ADDRSTRLEN + 1], s_time[29], *linestart, *line;
data/util-linux-2.36.1/login-utils/utmpdump.c:352:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			out = fopen(optarg, "w");
data/util-linux-2.36.1/login-utils/utmpdump.c:372:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in = fopen(filename, "r");
data/util-linux-2.36.1/login-utils/vipw.c:86:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char orig_file[FILENAMELEN];	/* original file /etc/passwd or /etc/group */
data/util-linux-2.36.1/login-utils/vipw.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8 * 1024];
data/util-linux-2.36.1/login-utils/vipw.c:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[FILENAMELEN + 4];
data/util-linux-2.36.1/login-utils/vipw.c:259:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	passwd_file = open(orig_file, O_RDONLY | O_CLOEXEC, 0);
data/util-linux-2.36.1/login-utils/vipw.c:277:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		tmp_fd = fopen(tmp_file, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/login-utils/vipw.c:357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char response[80];
data/util-linux-2.36.1/misc-utils/blkid.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *show[128];
data/util-linux-2.36.1/misc-utils/blkid.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			mtpt[80];
data/util-linux-2.36.1/misc-utils/blkid.c:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char enc[265], safe[256];
data/util-linux-2.36.1/misc-utils/blkid.c:394:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str, a, asz);
data/util-linux-2.36.1/misc-utils/blkid.c:398:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str, b, bsz);
data/util-linux-2.36.1/misc-utils/blkid.c:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char enc[256];
data/util-linux-2.36.1/misc-utils/blkid.c:507:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(devname, O_RDONLY|O_CLOEXEC|O_NONBLOCK);
data/util-linux-2.36.1/misc-utils/cal.c:206:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char day_headings[(WEEK_LEN + 1) * 6 + 1];
data/util-linux-2.36.1/misc-utils/cal.c:217:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *full_month[MONTHS_IN_YEAR];	/* month names */
data/util-linux-2.36.1/misc-utils/cal.c:218:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *abbr_month[MONTHS_IN_YEAR];	/* abbreviated month names */
data/util-linux-2.36.1/misc-utils/cal.c:219:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *weekdays[DAYS_IN_WEEK];     /* day names */
data/util-linux-2.36.1/misc-utils/cal.c:690:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[FMT_ST_CHARS];
data/util-linux-2.36.1/misc-utils/cal.c:780:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out[FMT_ST_CHARS];
data/util-linux-2.36.1/misc-utils/cal.c:822:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out[FMT_ST_CHARS];
data/util-linux-2.36.1/misc-utils/cal.c:856:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out[FMT_ST_CHARS];
data/util-linux-2.36.1/misc-utils/cal.c:921:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out[FMT_ST_CHARS];
data/util-linux-2.36.1/misc-utils/cal.c:1059:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out[FMT_ST_CHARS];
data/util-linux-2.36.1/misc-utils/cal.c:1226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lineout[FMT_ST_CHARS];
data/util-linux-2.36.1/misc-utils/cal.c:1245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lineout[FMT_ST_CHARS];
data/util-linux-2.36.1/misc-utils/fincore.c:170:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char vec[N_PAGES_IN_WINDOW];
data/util-linux-2.36.1/misc-utils/fincore.c:235:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open (name, O_RDONLY)) < 0) {
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[80], *cp, *t;
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:310:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("/proc/filesystems", "r");
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:351:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(buf, "r");
data/util-linux-2.36.1/misc-utils/findmnt.c:1113:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(tabfile, "r");
data/util-linux-2.36.1/misc-utils/hardlink.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char iobuf1[BUFSIZ];
data/util-linux-2.36.1/misc-utils/hardlink.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char iobuf2[BUFSIZ];
data/util-linux-2.36.1/misc-utils/hardlink.c:202:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dp->name, name, namelen + 1);
data/util-linux-2.36.1/misc-utils/hardlink.c:222:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(name, O_RDONLY);
data/util-linux-2.36.1/misc-utils/hardlink.c:271:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				int fd2 = open(fp2->name, O_RDONLY);
data/util-linux-2.36.1/misc-utils/hardlink.c:327:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(nam2.buf, n2, n2len);
data/util-linux-2.36.1/misc-utils/hardlink.c:328:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&nam2.buf[n2len], suffix,
data/util-linux-2.36.1/misc-utils/hardlink.c:375:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fp2->name, name, namelen + 1);
data/util-linux-2.36.1/misc-utils/hardlink.c:483:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nam1.buf, dp->name, nam1baselen);
data/util-linux-2.36.1/misc-utils/hardlink.c:519:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&nam1.buf[nam1baselen], di->d_name,
data/util-linux-2.36.1/misc-utils/logger.c:364:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(p, buf + 8, sz - 8);
data/util-linux-2.36.1/misc-utils/logger.c:387:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			fprintf(stderr, "%s\n", (char *) iovec[n].iov_base);
data/util-linux-2.36.1/misc-utils/logger.c:414:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char time[32];
data/util-linux-2.36.1/misc-utils/logger.c:481:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char   control[CMSG_SPACE(sizeof(struct ucred))];
data/util-linux-2.36.1/misc-utils/logger.c:546:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pid[30], *hostname;
data/util-linux-2.36.1/misc-utils/logger.c:782:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char fmt[64];
data/util-linux-2.36.1/misc-utils/logger.c:888:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pid[32];
data/util-linux-2.36.1/misc-utils/logger.c:1239:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				jfd = fopen(optarg, "r");
data/util-linux-2.36.1/misc-utils/look.c:156:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(file, O_RDONLY, 0)) < 0 || fstat(fd, &sb))
data/util-linux-2.36.1/misc-utils/lsblk-mnt.c:36:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[PATH_MAX];
data/util-linux-2.36.1/misc-utils/lsblk-mnt.c:69:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[PATH_MAX];
data/util-linux-2.36.1/misc-utils/lsblk-properties.c:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/misc-utils/lsblk.c:341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/misc-utils/lsblk.c:362:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev->filename, O_RDONLY);
data/util-linux-2.36.1/misc-utils/lsblk.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/util-linux-2.36.1/misc-utils/lsblk.c:505:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/misc-utils/lsblk.c:527:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(res + len, sub, sz + 1);
data/util-linux-2.36.1/misc-utils/lsblk.c:769:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char md[11] = { '\0' };
data/util-linux-2.36.1/misc-utils/lsblk.c:1379:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[PATH_MAX];
data/util-linux-2.36.1/misc-utils/lsblk.c:1436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX + 1], *name = NULL, *diskname = NULL;
data/util-linux-2.36.1/misc-utils/lslocks.c:169:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX], sym[PATH_MAX], *ret = NULL;
data/util-linux-2.36.1/misc-utils/lslocks.c:180:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(path, "/proc/%d/fd/", lock_pid);
data/util-linux-2.36.1/misc-utils/lslocks.c:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX], *tok = NULL;
data/util-linux-2.36.1/misc-utils/lslocks.c:241:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(fp = fopen(_PATH_PROC_LOCKS, "r")))
data/util-linux-2.36.1/misc-utils/mcookie.c:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[BUFFERSIZE];
data/util-linux-2.36.1/misc-utils/mcookie.c:116:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(fname, O_RDONLY);
data/util-linux-2.36.1/misc-utils/mcookie.c:138:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[UL_MD5LENGTH];
data/util-linux-2.36.1/misc-utils/mcookie.c:139:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[RAND_BYTES];
data/util-linux-2.36.1/misc-utils/namei.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sym[PATH_MAX];
data/util-linux-2.36.1/misc-utils/namei.c:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nm->abslink, path, nm->relstart);
data/util-linux-2.36.1/misc-utils/namei.c:107:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nm->abslink + nm->relstart, sym, sz - nm->relstart);
data/util-linux-2.36.1/misc-utils/namei.c:112:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nm->abslink, sym, sz);
data/util-linux-2.36.1/misc-utils/namei.c:131:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path, dirname, len);
data/util-linux-2.36.1/misc-utils/namei.c:132:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path + len, DOTDOTDIR, sizeof(DOTDOTDIR));
data/util-linux-2.36.1/misc-utils/namei.c:272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char md[11];
data/util-linux-2.36.1/misc-utils/rename.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[2];
data/util-linux-2.36.1/misc-utils/test_uuidd.c:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_string[UUID_STR_LEN], *p;
data/util-linux-2.36.1/misc-utils/uuidd.c:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char op_buf[8];
data/util-linux-2.36.1/misc-utils/uuidd.c:140:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(op_buf + 1, num, sizeof(int));
data/util-linux-2.36.1/misc-utils/uuidd.c:169:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf + UUID_LEN, num, sizeof(int));
data/util-linux-2.36.1/misc-utils/uuidd.c:175:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf, num, sizeof(int));
data/util-linux-2.36.1/misc-utils/uuidd.c:195:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd_pidfile = open(pidfile_path, O_CREAT | O_RDWR, 0664);
data/util-linux-2.36.1/misc-utils/uuidd.c:314:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			reply_buf[1024], *cp;
data/util-linux-2.36.1/misc-utils/uuidd.c:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			op, str[UUID_STR_LEN];
data/util-linux-2.36.1/misc-utils/uuidd.c:364:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(reply_buf, "%8d\n", getpid());
data/util-linux-2.36.1/misc-utils/uuidd.c:454:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(reply_buf, "%d", getpid());
data/util-linux-2.36.1/misc-utils/uuidd.c:458:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(reply_buf, "%d", UUIDD_MAX_OP);
data/util-linux-2.36.1/misc-utils/uuidd.c:468:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reply_buf, uu, sizeof(uu));
data/util-linux-2.36.1/misc-utils/uuidd.c:478:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reply_buf, uu, sizeof(uu));
data/util-linux-2.36.1/misc-utils/uuidd.c:491:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reply_buf, uu, sizeof(uu));
data/util-linux-2.36.1/misc-utils/uuidd.c:493:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reply_buf + reply_len, &num, sizeof(num));
data/util-linux-2.36.1/misc-utils/uuidd.c:516:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(reply_buf, &num, sizeof(num));
data/util-linux-2.36.1/misc-utils/uuidd.c:540:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[1024], *cp;
data/util-linux-2.36.1/misc-utils/uuidd.c:541:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str[UUID_STR_LEN];
data/util-linux-2.36.1/misc-utils/uuidd.c:697:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((ret > 0) && ((do_kill = atoi((char *) buf)) > 0)) {
data/util-linux-2.36.1/misc-utils/uuidgen.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   str[UUID_STR_LEN];
data/util-linux-2.36.1/misc-utils/uuidparse.c:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char date_buf[ISO_BUFSIZ];
data/util-linux-2.36.1/misc-utils/uuidparse.c:274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char uuid[UUID_STR_LEN];
data/util-linux-2.36.1/misc-utils/whereis.c:262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX], *d;
data/util-linux-2.36.1/misc-utils/whereis.c:458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char patbuf[PATH_MAX];
data/util-linux-2.36.1/misc-utils/wipefs.c:369:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wp->magic, mag, *len);
data/util-linux-2.36.1/misc-utils/wipefs.c:390:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open(devname, mode | O_NONBLOCK);
data/util-linux-2.36.1/misc-utils/wipefs.c:497:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname, O_CREAT | O_WRONLY, S_IRUSR | S_IWUSR);
data/util-linux-2.36.1/misc-utils/wipefs.c:840:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			int fd = open(devname, O_RDONLY);
data/util-linux-2.36.1/sys-utils/blkdiscard.c:223:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDWR | (force ? 0 : O_EXCL));
data/util-linux-2.36.1/sys-utils/blkzone.c:137:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(ctl->devname, mode);
data/util-linux-2.36.1/sys-utils/chmem.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *name, *onoff, line[BUFSIZ], str[BUFSIZ];
data/util-linux-2.36.1/sys-utils/chmem.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *name, *onoff, line[BUFSIZ], str[BUFSIZ];
data/util-linux-2.36.1/sys-utils/chmem.c:261:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[128];
data/util-linux-2.36.1/sys-utils/dmesg.c:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char levels[ARRAY_SIZE(level_names) / NBBY + 1];
data/util-linux-2.36.1/sys-utils/dmesg.c:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char facilities[ARRAY_SIZE(facility_names) / NBBY + 1];
data/util-linux-2.36.1/sys-utils/dmesg.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		kmsg_buf[BUFSIZ];/* buffer to read kmsg data */
data/util-linux-2.36.1/sys-utils/dmesg.c:528:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(ctl->filename, O_RDONLY);
data/util-linux-2.36.1/sys-utils/dmesg.c:900:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/util-linux-2.36.1/sys-utils/dmesg.c:901:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fpbuf[32] = "\0";
data/util-linux-2.36.1/sys-utils/dmesg.c:902:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tsbuf[64] = "\0";
data/util-linux-2.36.1/sys-utils/dmesg.c:1123:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ctl->kmsg = open("/dev/kmsg", mode);
data/util-linux-2.36.1/sys-utils/eject.c:302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PATH_MAX];
data/util-linux-2.36.1/sys-utils/eject.c:497:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_PROC_CDROMINFO, "r");
data/util-linux-2.36.1/sys-utils/eject.c:504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[512];
data/util-linux-2.36.1/sys-utils/eject.c:538:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				return atoi(str);
data/util-linux-2.36.1/sys-utils/eject.c:576:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char allowRmBlk[6] = {ALLOW_MEDIUM_REMOVAL, 0, 0, 0, 0, 0};
data/util-linux-2.36.1/sys-utils/eject.c:577:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char startStop1Blk[6] = {START_STOP, 0, 0, 0, 1, 0};
data/util-linux-2.36.1/sys-utils/eject.c:578:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char startStop2Blk[6] = {START_STOP, 0, 0, 0, 2, 0};
data/util-linux-2.36.1/sys-utils/eject.c:579:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char inqBuff[2];
data/util-linux-2.36.1/sys-utils/eject.c:580:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sense_buffer[32];
data/util-linux-2.36.1/sys-utils/eject.c:694:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ctl->fd = open(ctl->device, O_RDWR | O_NONBLOCK | extra);
data/util-linux-2.36.1/sys-utils/eject.c:696:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ctl->fd = open(ctl->device, O_RDONLY | O_NONBLOCK | extra);
data/util-linux-2.36.1/sys-utils/eject.c:750:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char diskname[128];
data/util-linux-2.36.1/sys-utils/fallocate.c:402:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDWR | (!dig && !mode ? O_CREAT : 0),
data/util-linux-2.36.1/sys-utils/flock.c:98:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, fl, 0666);
data/util-linux-2.36.1/sys-utils/flock.c:105:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(filename, fl);
data/util-linux-2.36.1/sys-utils/fsfreeze.c:114:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(path, O_RDONLY);
data/util-linux-2.36.1/sys-utils/fstrim.c:101:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(rpath, O_RDONLY);
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:1227:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM];
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:1421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char yymsgbuf[128];
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2909:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buff[20];
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2990:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char * get_tz(char tzbuf[TZBUFSIZE])
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2990:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char * get_tz(char tzbuf[TZBUFSIZE])
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2996:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		      ? memcpy (tzbuf, tz, tzsize)
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:3021:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tz0buf[TZBUFSIZE];
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:3055:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tz1buf[TZBUFSIZE];
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:3256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tz1buf[sizeof "XXX+0:00"
data/util-linux-2.36.1/sys-utils/hwclock-rtc.c:127:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		rtc_dev_fd = open(rtc_dev_name, O_RDONLY);
data/util-linux-2.36.1/sys-utils/hwclock-rtc.c:132:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			rtc_dev_fd = open(fls[i], O_RDONLY);
data/util-linux-2.36.1/sys-utils/hwclock.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line1[81];		/* String: first line of adjtime file */
data/util-linux-2.36.1/sys-utils/hwclock.c:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line2[81];		/* String: second line of adjtime file */
data/util-linux-2.36.1/sys-utils/hwclock.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line3[81];		/* String: third line of adjtime file */
data/util-linux-2.36.1/sys-utils/hwclock.c:233:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	adjfile = fopen(ctl->adj_file_name, "r");	/* open file for reading */
data/util-linux-2.36.1/sys-utils/hwclock.c:424:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[128 + 1];
data/util-linux-2.36.1/sys-utils/hwclock.c:630:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ISO_BUFSIZ];
data/util-linux-2.36.1/sys-utils/hwclock.c:900:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(ctl->adj_file_name, "w");
data/util-linux-2.36.1/sys-utils/ipcs.c:49:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[CTIME_BUFSIZ];
data/util-linux-2.36.1/sys-utils/ipcs.c:123:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			id = atoi (optarg);
data/util-linux-2.36.1/sys-utils/ipcutils.c:51:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_PROC_IPC_SEM, "r");
data/util-linux-2.36.1/sys-utils/ipcutils.c:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/sys-utils/ipcutils.c:111:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_PROC_SYSV_SHM, "r");
data/util-linux-2.36.1/sys-utils/ipcutils.c:259:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_PROC_SYSV_SEM, "r");
data/util-linux-2.36.1/sys-utils/ipcutils.c:367:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_PROC_SYSV_MSG, "r");
data/util-linux-2.36.1/sys-utils/ipcutils.c:498:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char format[32];
data/util-linux-2.36.1/sys-utils/ipcutils.c:514:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(format, "%%%dju", width);
data/util-linux-2.36.1/sys-utils/ipcutils.c:518:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(format, "%%%dju", width);
data/util-linux-2.36.1/sys-utils/ipcutils.c:524:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(format, "%%%ds", width);
data/util-linux-2.36.1/sys-utils/irq-common.c:212:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	irqfile = fopen(_PATH_PROC_INTERRUPTS, "r");
data/util-linux-2.36.1/sys-utils/irq-common.c:386:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(result, stat->irq_info, size);
data/util-linux-2.36.1/sys-utils/irqtop.c:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timestr[64], *data;
data/util-linux-2.36.1/sys-utils/ldattach.c:390:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((tty_fd = open(dev, O_RDWR | O_NOCTTY)) < 0)
data/util-linux-2.36.1/sys-utils/lscpu-arm.c:241:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			desc->vendor = (char *) hw_implementer[j].name;
data/util-linux-2.36.1/sys-utils/lscpu-arm.c:251:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			desc->modelname = (char *) parts[j].name;
data/util-linux-2.36.1/sys-utils/lscpu-arm.c:259:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[8];
data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:50:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(devmem, O_RDONLY)) < 0)
data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[64];
data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:211:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!(tab = fopen("/sys/firmware/efi/systab", "r")) &&
data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:212:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    !(tab = fopen("/proc/efi/systab", "r")))
data/util-linux-2.36.1/sys-utils/lscpu.c:429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/sys-utils/lscpu.c:523:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/sys-utils/lscpu.c:721:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hyper_vendor_id[13];
data/util-linux-2.36.1/sys-utils/lscpu.c:726:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hyper_vendor_id + 0, &ebx, 4);
data/util-linux-2.36.1/sys-utils/lscpu.c:727:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hyper_vendor_id + 4, &ecx, 4);
data/util-linux-2.36.1/sys-utils/lscpu.c:728:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hyper_vendor_id + 8, &edx, 4);
data/util-linux-2.36.1/sys-utils/lscpu.c:758:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[256];
data/util-linux-2.36.1/sys-utils/lscpu.c:802:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[256];
data/util-linux-2.36.1/sys-utils/lscpu.c:915:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[256];
data/util-linux-2.36.1/sys-utils/lscpu.c:965:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[256];
data/util-linux-2.36.1/sys-utils/lscpu.c:988:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[BUFSIZ];
data/util-linux-2.36.1/sys-utils/lscpu.c:1042:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[BUFSIZ];
data/util-linux-2.36.1/sys-utils/lscpu.c:1204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mode[64];
data/util-linux-2.36.1/sys-utils/lscpu.c:1337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/util-linux-2.36.1/sys-utils/lscpu.c:1808:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ], *data;
data/util-linux-2.36.1/sys-utils/lscpu.c:1892:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/sys-utils/lscpu.c:1980:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char setbuf[setbuflen], *p;
data/util-linux-2.36.1/sys-utils/lscpu.c:2023:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/sys-utils/lscpu.c:2049:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(p, "32-bit, ");
data/util-linux-2.36.1/sys-utils/lscpu.c:2053:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(p, "64-bit, ");
data/util-linux-2.36.1/sys-utils/lscpu.c:2126:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			threads_per_core = atoi(desc->mtid) + 1;
data/util-linux-2.36.1/sys-utils/lsipc.c:446:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64] = {0};
data/util-linux-2.36.1/sys-utils/lsmem.c:281:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char valid_zones[BUFSIZ];
data/util-linux-2.36.1/sys-utils/lsmem.c:449:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/util-linux-2.36.1/sys-utils/lsmem.c:481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir[PATH_MAX];
data/util-linux-2.36.1/sys-utils/lsns.c:257:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[16];
data/util-linux-2.36.1/sys-utils/lsns.c:323:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char req[NLMSG_SPACE(sizeof(struct rtgenmsg))
data/util-linux-2.36.1/sys-utils/lsns.c:347:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char res[NLMSG_SPACE(sizeof(struct rtgenmsg))
data/util-linux-2.36.1/sys-utils/lsns.c:427:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/sys-utils/mount.c:341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ] = { 0 };
data/util-linux-2.36.1/sys-utils/mount.c:768:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char path[PATH_MAX];
data/util-linux-2.36.1/sys-utils/mountpoint.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[PATH_MAX], *cn;
data/util-linux-2.36.1/sys-utils/nsenter.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pathbuf[PATH_MAX];
data/util-linux-2.36.1/sys-utils/nsenter.c:129:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	*fd = open(path, O_RDONLY);
data/util-linux-2.36.1/sys-utils/nsenter.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/sys-utils/nsenter.c:446:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		wd_fd = open(".", O_RDONLY);
data/util-linux-2.36.1/sys-utils/readprofile.c:78:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return fopen(name, mode);
data/util-linux-2.36.1/sys-utils/readprofile.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fn_name[S_LEN], next_name[S_LEN];	/* current and next name */
data/util-linux-2.36.1/sys-utils/readprofile.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mode[8];
data/util-linux-2.36.1/sys-utils/readprofile.c:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapline[S_LEN];
data/util-linux-2.36.1/sys-utils/readprofile.c:235:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(defaultpro, O_WRONLY);
data/util-linux-2.36.1/sys-utils/readprofile.c:245:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (((proFd = open(proFile, O_RDONLY)) < 0)
data/util-linux-2.36.1/sys-utils/rfkill.c:190:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_DEV_RFKILL, O_RDONLY);
data/util-linux-2.36.1/sys-utils/rfkill.c:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_buf[ISO_BUFSIZ];
data/util-linux-2.36.1/sys-utils/rfkill.c:275:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char name[128];
data/util-linux-2.36.1/sys-utils/rfkill.c:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/sys-utils/rfkill.c:281:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "r");
data/util-linux-2.36.1/sys-utils/rfkill.c:313:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[64];
data/util-linux-2.36.1/sys-utils/rfkill.c:551:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_DEV_RFKILL, O_RDWR);
data/util-linux-2.36.1/sys-utils/rtcwake.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[128], *s;
data/util-linux-2.36.1/sys-utils/rtcwake.c:135:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(buf, "r");
data/util-linux-2.36.1/sys-utils/rtcwake.c:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[64];
data/util-linux-2.36.1/sys-utils/rtcwake.c:251:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[256] = { 0 };
data/util-linux-2.36.1/sys-utils/rtcwake.c:254:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(SYS_POWER_STATE_PATH, O_RDONLY);
data/util-linux-2.36.1/sys-utils/rtcwake.c:289:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE	*f = fopen(SYS_POWER_STATE_PATH, "w");
data/util-linux-2.36.1/sys-utils/rtcwake.c:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[ADJTIME_ZONE_BUFSIZ];
data/util-linux-2.36.1/sys-utils/rtcwake.c:312:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(ctl->adjfile, "r");
data/util-linux-2.36.1/sys-utils/rtcwake.c:342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[CTIME_BUFSIZ];
data/util-linux-2.36.1/sys-utils/rtcwake.c:400:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(devpath, O_RDONLY | O_CLOEXEC);
data/util-linux-2.36.1/sys-utils/rtcwake.c:562:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[CTIME_BUFSIZ];
data/util-linux-2.36.1/sys-utils/rtcwake.c:575:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[CTIME_BUFSIZ];
data/util-linux-2.36.1/sys-utils/rtcwake.c:581:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[CTIME_BUFSIZ];
data/util-linux-2.36.1/sys-utils/rtcwake.c:599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *arg[5];
data/util-linux-2.36.1/sys-utils/setpriv.c:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4097];
data/util-linux-2.36.1/sys-utils/setpriv.c:257:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_PROC_ATTR_CURRENT, O_RDONLY);
data/util-linux-2.36.1/sys-utils/setpriv.c:625:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(_PATH_PROC_ATTR_EXEC, O_RDWR);
data/util-linux-2.36.1/sys-utils/setpriv.c:648:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(_PATH_PROC_ATTR_EXEC, "r+");
data/util-linux-2.36.1/sys-utils/setpriv.c:732:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	rv = memcpy(dst, src, sizeof(*dst));
data/util-linux-2.36.1/sys-utils/swapon.c:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char const *cmd[7];
data/util-linux-2.36.1/sys-utils/swapon.c:372:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev->path, O_WRONLY);
data/util-linux-2.36.1/sys-utils/swapon.c:490:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[UUID_STR_LEN];
data/util-linux-2.36.1/sys-utils/swapon.c:515:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev->path, O_RDONLY);
data/util-linux-2.36.1/sys-utils/swapon.c:718:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		props->priority = atoi(arg);
data/util-linux-2.36.1/sys-utils/switch_root.c:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char newmount[PATH_MAX];
data/util-linux-2.36.1/sys-utils/switch_root.c:165:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cfd = open("/", O_RDONLY);
data/util-linux-2.36.1/sys-utils/tunelp.c:246:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_WRONLY | O_NONBLOCK, 0);
data/util-linux-2.36.1/sys-utils/umount.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ] = { 0 };
data/util-linux-2.36.1/sys-utils/umount.c:561:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char path[PATH_MAX];
data/util-linux-2.36.1/sys-utils/unshare.c:108:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_WRONLY);
data/util-linux-2.36.1/sys-utils/unshare.c:125:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_WRONLY);
data/util-linux-2.36.1/sys-utils/unshare.c:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src[PATH_MAX];
data/util-linux-2.36.1/sys-utils/unshare.c:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[PATH_MAX];
data/util-linux-2.36.1/sys-utils/unshare.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(stringify_value(ULONG_MAX)) * 3];
data/util-linux-2.36.1/sys-utils/unshare.c:219:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/proc/self/timens_offsets", O_WRONLY);
data/util-linux-2.36.1/sys-utils/wdctl.c:355:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(wd->devpath, O_WRONLY|O_CLOEXEC);
data/util-linux-2.36.1/sys-utils/wdctl.c:411:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(wd->devpath, O_WRONLY|O_CLOEXEC);
data/util-linux-2.36.1/sys-utils/zramctl.c:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	devname[32];
data/util-linux-2.36.1/sys-utils/zramctl.c:447:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char path[PATH_MAX] = { '\0' };
data/util-linux-2.36.1/term-utils/agetty.c:375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *login_argv[LOGIN_ARGV_MAX + 1];
data/util-linux-2.36.1/term-utils/agetty.c:393:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dbf = fopen(DEBUG_OUTPUT, "w");
data/util-linux-2.36.1/term-utils/agetty.c:601:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tp, str, p - str);
data/util-linux-2.36.1/term-utils/agetty.c:606:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tp, username, usz);
data/util-linux-2.36.1/term-utils/agetty.c:611:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tp, p + 2, sz - (p - str) - 1);
data/util-linux-2.36.1/term-utils/agetty.c:1036:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[PATH_MAX+1];
data/util-linux-2.36.1/term-utils/agetty.c:1052:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fd = open(buf, O_RDWR|O_NOCTTY|O_NONBLOCK, 0)) < 0)
data/util-linux-2.36.1/term-utils/agetty.c:1105:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (open(buf, O_RDWR|O_NOCTTY|O_NONBLOCK, 0) != 0)
data/util-linux-2.36.1/term-utils/agetty.c:1418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/term-utils/agetty.c:1520:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(_PATH_OS_RELEASE_ETC, O_RDONLY);
data/util-linux-2.36.1/term-utils/agetty.c:1522:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(_PATH_OS_RELEASE_USR, O_RDONLY);
data/util-linux-2.36.1/term-utils/agetty.c:1619:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/util-linux-2.36.1/term-utils/agetty.c:1673:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[sizeof(struct inotify_event) + NAME_MAX + 1];
data/util-linux-2.36.1/term-utils/agetty.c:1678:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int reload_fd = open(AGETTY_RELOAD_FILENAME,
data/util-linux-2.36.1/term-utils/agetty.c:1766:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dd = open(dirname, O_RDONLY|O_CLOEXEC|O_DIRECTORY);
data/util-linux-2.36.1/term-utils/agetty.c:1859:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen(filename, "r" UL_CLOEXECSTR);
data/util-linux-2.36.1/term-utils/agetty.c:2053:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hint[256] = { '\0' };
data/util-linux-2.36.1/term-utils/agetty.c:2136:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char logname[BUFSIZ];
data/util-linux-2.36.1/term-utils/agetty.c:2423:15:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	long speed = atol(s);
data/util-linux-2.36.1/term-utils/agetty.c:2517:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/term-utils/agetty.c:2518:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_fmt[BUFSIZ];
data/util-linux-2.36.1/term-utils/agetty.c:2526:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open("/dev/console", 1)) >= 0) {
data/util-linux-2.36.1/term-utils/agetty.c:2562:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[INET6_ADDRSTRLEN + 1];
data/util-linux-2.36.1/term-utils/agetty.c:2686:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char escname[UL_COLORNAME_MAXSZ];
data/util-linux-2.36.1/term-utils/agetty.c:2832:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char iface[128];
data/util-linux-2.36.1/term-utils/agetty.c:2924:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, sep, ssz);
data/util-linux-2.36.1/term-utils/agetty.c:2927:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, src, sz);
data/util-linux-2.36.1/term-utils/agetty.c:2958:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(AGETTY_RELOAD_FILENAME, O_CREAT|O_CLOEXEC|O_WRONLY,
data/util-linux-2.36.1/term-utils/mesg.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ttybuf[sizeof(_PATH_PROC_FDDIR) + sizeof(stringify_value(INT_MAX))];
data/util-linux-2.36.1/term-utils/mesg.c:142:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(tty, O_RDONLY)) < 0)
data/util-linux-2.36.1/term-utils/script-playutils.c:190:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	stp->timing_fp = fopen(filename, "r");
data/util-linux-2.36.1/term-utils/script-playutils.c:250:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/util-linux-2.36.1/term-utils/script-playutils.c:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[BUFSIZ];
data/util-linux-2.36.1/term-utils/script-playutils.c:496:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/term-utils/script.c:291:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[FORMAT_TIMESTAMP_MAX];
data/util-linux-2.36.1/term-utils/script.c:377:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	log->fp = fopen(log->filename,
data/util-linux-2.36.1/term-utils/script.c:390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[FORMAT_TIMESTAMP_MAX];
data/util-linux-2.36.1/term-utils/script.c:525:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[BUFSIZ] = {0};
data/util-linux-2.36.1/term-utils/script.c:566:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[BUFSIZ] = {0};
data/util-linux-2.36.1/term-utils/script.c:1002:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[FORMAT_TIMESTAMP_MAX];
data/util-linux-2.36.1/term-utils/scriptreplay.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char streams[6] = {0};		/* IOSI - in, out, signal,info */
data/util-linux-2.36.1/term-utils/setterm.c:744:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(ctl->in_device, O_RDONLY);
data/util-linux-2.36.1/term-utils/setterm.c:785:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char header[4];
data/util-linux-2.36.1/term-utils/setterm.c:797:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out = fopen(ctl->opt_sn_name, ctl->opt_snap ? "w" : "a");
data/util-linux-2.36.1/term-utils/setterm.c:852:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tattr, saved_attributes, sizeof(struct termios));
data/util-linux-2.36.1/term-utils/setterm.c:895:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char retstr[32];
data/util-linux-2.36.1/term-utils/setterm.c:1114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ioctlarg[2];
data/util-linux-2.36.1/term-utils/ttymsg.c:72:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char device[MAXNAMLEN];
data/util-linux-2.36.1/term-utils/ttymsg.c:73:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char errbuf[ERR_BUFLEN];
data/util-linux-2.36.1/term-utils/ttymsg.c:102:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(device, O_WRONLY|O_NONBLOCK, 0)) < 0) {
data/util-linux-2.36.1/term-utils/wall.c:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[sizeof(utmpptr->ut_line) + 1];
data/util-linux-2.36.1/term-utils/wall.c:295:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(bs->data + bs->used, s, len + 1);
data/util-linux-2.36.1/term-utils/wall.c:353:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *whom, *where, date[CTIME_BUFSIZ];
data/util-linux-2.36.1/term-utils/write.c:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[sizeof(u->ut_line) + 6];
data/util-linux-2.36.1/term-utils/write.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *host, line[512];
data/util-linux-2.36.1/tests/helpers/test_md5.c:11:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[UL_MD5LENGTH];
data/util-linux-2.36.1/tests/helpers/test_md5.c:12:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[BUFSIZ];
data/util-linux-2.36.1/tests/helpers/test_sha1.c:11:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[UL_SHA1LENGTH];
data/util-linux-2.36.1/tests/helpers/test_sha1.c:12:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[BUFSIZ];
data/util-linux-2.36.1/tests/helpers/test_uuid_namespace.c:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[UUID_STR_LEN];
data/util-linux-2.36.1/tests/helpers/test_uuid_namespace.c:14:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(buf, "NULL");
data/util-linux-2.36.1/text-utils/colcrt.c:70:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		line[OUTPUT_COLS + 1];
data/util-linux-2.36.1/text-utils/colcrt.c:71:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		line_under[OUTPUT_COLS + 1];
data/util-linux-2.36.1/text-utils/colcrt.c:283:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (!(ctl.f = fopen(*argv, "r")))
data/util-linux-2.36.1/text-utils/column.c:823:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((fp = fopen(*argv, "r")) != NULL) {
data/util-linux-2.36.1/text-utils/hexdump-display.c:92:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&val, bp + offt - address, clr->range);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:83:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(name, "r")) == NULL)
data/util-linux-2.36.1/text-utils/hexdump-parse.c:136:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tfu->reps = atoi(savep);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:153:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tfu->bcnt = atoi(savep);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:203:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				prec = atoi(fmt);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:229:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char savech, cs[4];
data/util-linux-2.36.1/text-utils/hexdump-parse.c:272:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					prec = atoi(p1);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:575:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(hc, hcnext, sizeof(struct hexdump_clr));
data/util-linux-2.36.1/text-utils/more.c:421:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	signed char twobytes[2];
data/util-linux-2.36.1/text-utils/more.c:456:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (((ctl->current_file = fopen(fs, "r")) == NULL) ||
data/util-linux-2.36.1/text-utils/more.c:511:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mbc[MB_LEN_MAX];		/* Buffer for one multibyte char. */
data/util-linux-2.36.1/text-utils/more.c:1226:4:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			open("/dev/tty", 0);
data/util-linux-2.36.1/text-utils/more.c:1279:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdbuf[COMMAND_BUF];
data/util-linux-2.36.1/text-utils/more.c:1411:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[REGERR_BUF];
data/util-linux-2.36.1/text-utils/more.c:1536:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(cmdbuf, "-c %d", n);
data/util-linux-2.36.1/text-utils/more.c:1539:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(cmdbuf, "+%d", n);
data/util-linux-2.36.1/text-utils/more.c:1607:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdbuf[INIT_BUF];
data/util-linux-2.36.1/text-utils/more.c:1858:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/util-linux-2.36.1/text-utils/pg.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[CMDBUF];
data/util-linux-2.36.1/text-utils/pg.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pattern[CMDBUF];
data/util-linux-2.36.1/text-utils/pg.c:149:8:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static wchar_t wbuf[READBUF];		/* used in several widechar routines */
data/util-linux-2.36.1/text-utils/pg.c:324:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if ((envlines = atoi(p)) < 0)
data/util-linux-2.36.1/text-utils/pg.c:327:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if ((envcols = atoi(p)) < 0)
data/util-linux-2.36.1/text-utils/pg.c:603:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i = atoi(buf + 1);
data/util-linux-2.36.1/text-utils/pg.c:605:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i = atoi(buf);
data/util-linux-2.36.1/text-utils/pg.c:619:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[LINE_MAX], *p;
data/util-linux-2.36.1/text-utils/pg.c:626:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(b + (p - pstring), "%lld", pageno);
data/util-linux-2.36.1/text-utils/pg.c:924:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[READBUF + 1];
data/util-linux-2.36.1/text-utils/pg.c:942:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		fbuf = tmpfile();
data/util-linux-2.36.1/text-utils/pg.c:947:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	find = tmpfile();
data/util-linux-2.36.1/text-utils/pg.c:1211:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				save = fopen(p, "wb");
data/util-linux-2.36.1/text-utils/pg.c:1377:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
							open(tty, O_RDONLY);
data/util-linux-2.36.1/text-utils/pg.c:1518:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			input = fopen(argv[arg], "r");
data/util-linux-2.36.1/text-utils/rev.c:139:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ((fp = fopen(*argv, "r")) == NULL) {
data/util-linux-2.36.1/text-utils/ul.c:228:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(argv[optind],"r");
data/util-linux-2.36.1/disk-utils/blockdev.c:208:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(int)(24 - strlen(bdcms[i].name)),
data/util-linux-2.36.1/disk-utils/cfdisk.c:513:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cf->linesbufsz = strlen(cf->linesbuf);
data/util-linux-2.36.1/disk-utils/cfdisk.c:1452:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tbstr += strlen(tbstr) + 1;
data/util-linux-2.36.1/disk-utils/cfdisk.c:1859:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rc = strlen(edit->buf);		/* success */
data/util-linux-2.36.1/disk-utils/cfdisk.c:1906:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(buf);
data/util-linux-2.36.1/disk-utils/fdformat.c:97:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				read_bytes = read(ctrl, data, track_size);
data/util-linux-2.36.1/disk-utils/fdisk-list.c:455:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(name) + 1;
data/util-linux-2.36.1/disk-utils/fdisk.c:141:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sz = strlen(reply_line);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:173:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, &super, sizeof(super)) != sizeof(super))
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:180:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read(fd, &super, sizeof(super)) != sizeof(super))
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:235:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			tmp = read(fd, buf, super.size);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:256:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			retval = read(fd, buf, 4096);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:309:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		x = read(fd, read_buffer, ROMBUFFERSIZE * 2);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:442:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pathlen = strlen(path);
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:481:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((pathlen + newlen) - strlen(newpath) > 3)
data/util-linux-2.36.1/disk-utils/fsck.cramfs.c:623:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(0);
data/util-linux-2.36.1/disk-utils/fsck.minix.c:366:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} else if (MINIX_BLOCK_SIZE != read(device_fd, addr, MINIX_BLOCK_SIZE)) {
data/util-linux-2.36.1/disk-utils/fsck.minix.c:564:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (MINIX_BLOCK_SIZE != read(device_fd, super_block_buffer, MINIX_BLOCK_SIZE))
data/util-linux-2.36.1/disk-utils/fsck.minix.c:628:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read(device_fd, inode_map, imaps * MINIX_BLOCK_SIZE);
data/util-linux-2.36.1/disk-utils/fsck.minix.c:632:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read(device_fd, zone_map, zmaps * MINIX_BLOCK_SIZE);
data/util-linux-2.36.1/disk-utils/fsck.minix.c:636:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read(device_fd, inode_buffer, buffsz);
data/util-linux-2.36.1/disk-utils/fsck.minix.c:1135:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return (MINIX_BLOCK_SIZE != read(device_fd, buffer, MINIX_BLOCK_SIZE));
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:143:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(optarg);
data/util-linux-2.36.1/disk-utils/mkfs.bfs.c:150:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(optarg);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:220:6:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	int equal;
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:233:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	return equal;
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:293:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(name);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:328:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		namelen = strlen(dirent->d_name);
data/util-linux-2.36.1/disk-utils/mkfs.cramfs.c:466:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen((const char *)entry->name);
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:412:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(tmp + 4, ".");
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:421:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(tmp + 2, ".");
data/util-linux-2.36.1/disk-utils/mkfs.minix.c:588:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	got = read(ctl->device_fd, buffer, try * MINIX_BLOCK_SIZE);
data/util-linux-2.36.1/disk-utils/mkswap.c:124:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(ctl->opt_label) > strlen(ctl->hdr->volume_name))
data/util-linux-2.36.1/disk-utils/mkswap.c:124:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(ctl->opt_label) > strlen(ctl->hdr->volume_name))
data/util-linux-2.36.1/disk-utils/mkswap.c:202:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = read(ctl->fd, buffer, ctl->pagesize);
data/util-linux-2.36.1/disk-utils/partx.c:194:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(partition);
data/util-linux-2.36.1/disk-utils/partx.c:248:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(parent, d->d_name, strlen(parent)) != 0)
data/util-linux-2.36.1/disk-utils/sfdisk.c:159:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(buf);
data/util-linux-2.36.1/disk-utils/sfdisk.c:1590:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(p);
data/util-linux-2.36.1/disk-utils/swaplabel.c:99:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(label) > strlen(newlabel))
data/util-linux-2.36.1/disk-utils/swaplabel.c:99:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(label) > strlen(newlabel))
data/util-linux-2.36.1/include/all-io.h:65:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(fd, buf, count);
data/util-linux-2.36.1/include/c.h:192:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(prog_inv_sh_nm_buf, t, sizeof(prog_inv_sh_nm_buf) - 1);
data/util-linux-2.36.1/include/c.h:339:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	return usleep(usec);
data/util-linux-2.36.1/include/mangle.h:18:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unmangle_to_buffer(s, s, strlen(s) + 1);
data/util-linux-2.36.1/include/mangle.h:24:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unhexmangle_to_buffer(s, s, strlen(s) + 1);
data/util-linux-2.36.1/include/strutils.h:64:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(dest, src, n-1);
data/util-linux-2.36.1/include/strutils.h:77:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t bytes = strlen(src) + 1;
data/util-linux-2.36.1/include/strutils.h:109:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	osz = strlen(str);
data/util-linux-2.36.1/include/strutils.h:110:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nsz = strlen(newstr);
data/util-linux-2.36.1/include/strutils.h:208:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t sz = prefix ? strlen(prefix) : 0;
data/util-linux-2.36.1/include/strutils.h:220:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t sz = prefix ? strlen(prefix) : 0;
data/util-linux-2.36.1/include/strutils.h:232:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t sl = s ? strlen(s) : 0;
data/util-linux-2.36.1/include/strutils.h:233:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t pl = postfix ? strlen(postfix) : 0;
data/util-linux-2.36.1/include/strutils.h:273:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen((char *) str);
data/util-linux-2.36.1/include/strutils.h:298:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char *) p);
data/util-linux-2.36.1/include/widechar.h:21:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define fgetwc fgetc
data/util-linux-2.36.1/include/widechar.h:22:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define getwc getc
data/util-linux-2.36.1/include/widechar.h:23:19:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define getwchar getchar
data/util-linux-2.36.1/include/widechar.h:40:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define wcslen strlen
data/util-linux-2.36.1/include/widechar.h:40:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define wcslen strlen
data/util-linux-2.36.1/lib/blkdev.c:42:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read (fd, &ch, 1) < 1)
data/util-linux-2.36.1/lib/canonicalize.c:46:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (fgets(name, sizeof(name), f) && (sz = strlen(name)) > 1) {
data/util-linux-2.36.1/lib/canonicalize.c:106:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	csz = strlen(cwd);
data/util-linux-2.36.1/lib/canonicalize.c:107:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	psz = strlen(path);
data/util-linux-2.36.1/lib/canonicalize.c:189:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = canonical ? (ssize_t) strlen(canonical) :
data/util-linux-2.36.1/lib/colors.c:200:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!str || !*str || *str == '.' || strlen(str) > PATH_MAX)
data/util-linux-2.36.1/lib/colors.c:261:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namesz = strlen(cc->utilname);
data/util-linux-2.36.1/lib/colors.c:262:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	termsz = cc->termname ? strlen(cc->termname) : 0;
data/util-linux-2.36.1/lib/colors.c:314:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(sfile, d->d_name, sizeof(sfile));
data/util-linux-2.36.1/lib/cpuset.c:228:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(str);
data/util-linux-2.36.1/lib/env.c:65:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        if (strncmp(*cur, *bad, strlen(*bad)) == 0) {
data/util-linux-2.36.1/lib/env.c:75:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        if (strncmp(*cur, *bad, strlen(*bad)) != 0)
data/util-linux-2.36.1/lib/exec_shell.c:45:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	arg0 = xmalloc(strlen(shell_basename) + 2);
data/util-linux-2.36.1/lib/fileutils.c:66:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_mode = umask(077);
data/util-linux-2.36.1/lib/fileutils.c:68:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_mode);
data/util-linux-2.36.1/lib/idcache.c:69:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			w = strlen(name);
data/util-linux-2.36.1/lib/idcache.c:94:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		w = ent->name ? strlen(ent->name) : 0;
data/util-linux-2.36.1/lib/loopdev.c:112:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(device) < 5)
data/util-linux-2.36.1/lib/mangle.c:31:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ss = sp = malloc(4 * strlen(s) + 1);
data/util-linux-2.36.1/lib/mangle.c:160:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			unmangle_to_buffer(x, x, strlen(x) + 1);
data/util-linux-2.36.1/lib/match.c:39:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(type);
data/util-linux-2.36.1/lib/mbsalign.c:90:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return mbs_nwidth(s, strlen(s));
data/util-linux-2.36.1/lib/mbsalign.c:162:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return mbs_safe_nwidth(s, strlen(s), NULL);
data/util-linux-2.36.1/lib/mbsalign.c:177:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t sz = s ? strlen(s) : 0;
data/util-linux-2.36.1/lib/mbsalign.c:266:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t sz = s ? strlen(s) : 0;
data/util-linux-2.36.1/lib/mbsalign.c:330:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t sz = s ? strlen(s) : 0;
data/util-linux-2.36.1/lib/mbsalign.c:349:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t sz = s ? strlen(s) : 0;
data/util-linux-2.36.1/lib/mbsalign.c:434:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ssize_t bytes = strlen(str);
data/util-linux-2.36.1/lib/mbsalign.c:506:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t src_size = strlen (src) + 1;
data/util-linux-2.36.1/lib/mbsedit.c:27:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		edit->cur_bytes = strlen(buf);
data/util-linux-2.36.1/lib/mbsedit.c:142:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bytes      = strlen(str);
data/util-linux-2.36.1/lib/mbsedit.c:169:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bytes       = strlen(str);
data/util-linux-2.36.1/lib/path.c:857:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rc = write_all(fd, str, strlen(str));
data/util-linux-2.36.1/lib/path.c:1000:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(buf);
data/util-linux-2.36.1/lib/plymouth-ctrl.c:87:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		offsetof(struct sockaddr_un, sun_path) + 1 + strlen(su.sun_path+1));
data/util-linux-2.36.1/lib/pty-session.c:348:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytes = read(fd, buf, sizeof(buf));
data/util-linux-2.36.1/lib/pty-session.c:433:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytes = read(fd, &info, sizeof(info));
data/util-linux-2.36.1/lib/randutils.c:145:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				ssize_t x = read(fd, cp, n);
data/util-linux-2.36.1/lib/setproctitle.c:46:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		argv_lth = envp[i-1] + strlen(envp[i-1]) - argv[0];
data/util-linux-2.36.1/lib/setproctitle.c:48:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		argv_lth = argv[argc-1] + strlen(argv[argc-1]) - argv[0];
data/util-linux-2.36.1/lib/setproctitle.c:61:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(prog) + strlen(txt) + 5 > SPT_BUFSIZE)
data/util-linux-2.36.1/lib/setproctitle.c:61:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(prog) + strlen(txt) + 5 > SPT_BUFSIZE)
data/util-linux-2.36.1/lib/setproctitle.c:66:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i = strlen(buf);
data/util-linux-2.36.1/lib/strutils.c:121:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t dpsz = dp ? strlen(dp) : 0;
data/util-linux-2.36.1/lib/strutils.c:934:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        a = strlen(s);
data/util-linux-2.36.1/lib/strutils.c:951:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strnappend(s, suffix, suffix ? strlen(suffix) : 0);
data/util-linux-2.36.1/lib/strutils.c:1041:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((ch = fgetc(fp)) == EOF)
data/util-linux-2.36.1/lib/strv.c:226:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        k = strlen(separator);
data/util-linux-2.36.1/lib/strv.c:232:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                n += strlen(*s);
data/util-linux-2.36.1/lib/sysfs.c:195:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(name);
data/util-linux-2.36.1/lib/sysfs.c:226:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(p);
data/util-linux-2.36.1/lib/sysfs.c:227:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(d->d_name) <= len)
data/util-linux-2.36.1/lib/sysfs.c:350:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(chain);
data/util-linux-2.36.1/lib/sysfs.c:399:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		psz = strlen(prefix);
data/util-linux-2.36.1/lib/sysfs.c:966:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(name);
data/util-linux-2.36.1/lib/timeutils.c:133:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				p = e + strlen(table[i].suffix);
data/util-linux-2.36.1/lib/timeutils.c:238:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		z = strndup(t, strlen(t) - 4);
data/util-linux-2.36.1/lib/timeutils.c:256:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		skip = strlen(day_nr[i].name);
data/util-linux-2.36.1/libblkid/src/dev.c:158:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_type = malloc(strlen(search_type)+1);
data/util-linux-2.36.1/libblkid/src/dev.c:159:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_value = malloc(strlen(search_value)+1);
data/util-linux-2.36.1/libblkid/src/devname.c:164:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    strlen(de->d_name) > sizeof(path)-32)
data/util-linux-2.36.1/libblkid/src/devname.c:310:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int		vg_len = strlen(VG_DIR);
data/util-linux-2.36.1/libblkid/src/devname.c:327:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		vdirname = malloc(vg_len + strlen(vg_name) + 8);
data/util-linux-2.36.1/libblkid/src/devname.c:344:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lvm_device = malloc(vg_len + strlen(vg_name) +
data/util-linux-2.36.1/libblkid/src/devname.c:345:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(lv_name) + 8);
data/util-linux-2.36.1/libblkid/src/devname.c:504:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lens[which] = strlen(ptname);
data/util-linux-2.36.1/libblkid/src/devno.c:44:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	al = a ? strlen(a) : 0;
data/util-linux-2.36.1/libblkid/src/devno.c:45:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bl = b ? strlen(b) : 0;
data/util-linux-2.36.1/libblkid/src/devno.c:46:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cl = c ? strlen(c) : 0;
data/util-linux-2.36.1/libblkid/src/evaluate.c:162:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(dev);
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:628:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(name) + 1);
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:762:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					(const unsigned char *) v, strlen(v) + 1);
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:768:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(const unsigned char *) v, strlen(v) + 1);
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:773:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(const unsigned char *) v, strlen(v) + 1);
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:779:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(const unsigned char *) v, strlen(v) + 1);
data/util-linux-2.36.1/libblkid/src/partitions/partitions.c:1153:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!blkid_probe_set_value(pr, "PTUUID", (unsigned char *) str, strlen(str) + 1))
data/util-linux-2.36.1/libblkid/src/probe.c:564:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(pr->fd, bf->data, len);
data/util-linux-2.36.1/libblkid/src/probe.c:802:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	sz = read(fd, buf, sizeof(buf));
data/util-linux-2.36.1/libblkid/src/read.c:84:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p = line + strlen(line) - 1;
data/util-linux-2.36.1/libblkid/src/read.c:311:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = blkid_set_tag(dev, name, value, strlen(value));
data/util-linux-2.36.1/libblkid/src/read.c:399:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = strlen(buf) - 1;
data/util-linux-2.36.1/libblkid/src/read.c:403:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = strlen(buf) - 1;
data/util-linux-2.36.1/libblkid/src/save.c:131:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp = malloc(strlen(filename) + 8);
data/util-linux-2.36.1/libblkid/src/save.c:182:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			backup = malloc(strlen(filename) + 5);
data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:326:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   strlen(key), all_key_length, fs_le);
data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:343:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						   key, strlen(key),
data/util-linux-2.36.1/libblkid/src/superblocks/befs.c:404:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			&& FS16_TO_CPU(sd->name_size, fs_le) == strlen(KEY_NAME)
data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c:425:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(id->name) + 1);
data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c:539:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strlen(version) + 1);
data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c:583:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return blkid_probe_set_value(pr, "USAGE", (unsigned char *) u, strlen(u) + 1);
data/util-linux-2.36.1/libblkid/src/superblocks/superblocks.c:743:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen((const char *) str);
data/util-linux-2.36.1/libfdisk/src/dos.c:251:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	r = read(cxt->dev_fd, buf, cxt->sector_size);
data/util-linux-2.36.1/libfdisk/src/dos.c:1258:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		    && read) {
data/util-linux-2.36.1/libfdisk/src/dos.c:1267:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (!read && start == temp) {
data/util-linux-2.36.1/libfdisk/src/dos.c:1297:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	} while (start != temp || !read);
data/util-linux-2.36.1/libfdisk/src/gpt.c:975:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return (size_t)read(cxt->dev_fd, buffer, bytes) != bytes;
data/util-linux-2.36.1/libfdisk/src/gpt.c:1010:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssz = read(cxt->dev_fd, ret, sz);
data/util-linux-2.36.1/libfdisk/src/sgi.c:390:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(name);
data/util-linux-2.36.1/libfdisk/src/sgi.c:454:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(name);
data/util-linux-2.36.1/libfdisk/src/utils.c:32:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	r = read(cxt->dev_fd, buf, size);
data/util-linux-2.36.1/libfdisk/src/utils.c:135:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	w = strlen(dev);
data/util-linux-2.36.1/libmount/python/fs.c:84:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (len = strlen(s); len > _PY_MAX_LEN; len -= _PY_MAX_LEN, s += _PY_MAX_LEN)
data/util-linux-2.36.1/libmount/src/cache.c:224:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tksz = strlen(tagname);
data/util-linux-2.36.1/libmount/src/cache.c:225:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	vlsz = strlen(tagval);
data/util-linux-2.36.1/libmount/src/cache.c:275:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tksz = strlen(token);
data/util-linux-2.36.1/libmount/src/cache.c:303:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			return e->key + strlen(token) + 1;	/* tag value */
data/util-linux-2.36.1/libmount/src/cache.c:740:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t sz = strlen(line);
data/util-linux-2.36.1/libmount/src/cache.c:763:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t sz = strlen(line);
data/util-linux-2.36.1/libmount/src/cache.c:787:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t sz = strlen(line);
data/util-linux-2.36.1/libmount/src/cache.c:821:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				e->key + strlen(e->key) + 1);
data/util-linux-2.36.1/libmount/src/context.c:3437:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(S_IWGRP|S_IWOTH);	/* to be compatible with mount(8) */
data/util-linux-2.36.1/libmount/src/context_veritydev.c:46:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(hex);
data/util-linux-2.36.1/libmount/src/context_veritydev.c:122:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mapper_device = calloc(strlen(backing_file_basename) + strlen("libmnt_") + 1, sizeof(char));
data/util-linux-2.36.1/libmount/src/context_veritydev.c:122:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mapper_device = calloc(strlen(backing_file_basename) + strlen("libmnt_") + 1, sizeof(char));
data/util-linux-2.36.1/libmount/src/context_veritydev.c:371:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		mapper_device_full = calloc(strlen(mapper_device) + strlen("/dev/mapper/") + 1, sizeof(char));
data/util-linux-2.36.1/libmount/src/context_veritydev.c:371:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		mapper_device_full = calloc(strlen(mapper_device) + strlen("/dev/mapper/") + 1, sizeof(char));
data/util-linux-2.36.1/libmount/src/context_veritydev.c:509:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strncmp(src, "/dev/mapper/libmnt_", strlen("/dev/mapper/libmnt_"))) {
data/util-linux-2.36.1/libmount/src/fs.c:147:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(src) + 1;
data/util-linux-2.36.1/libmount/src/fs.c:726:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(vfs) + strlen(fs) + 5;
data/util-linux-2.36.1/libmount/src/fs.c:726:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(vfs) + strlen(fs) + 5;
data/util-linux-2.36.1/libmount/src/fs.c:745:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(p))
data/util-linux-2.36.1/libmount/src/lock.c:69:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	losz = strlen(datafile) + sizeof(".lock");
data/util-linux-2.36.1/libmount/src/lock.c:148:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(ml->lockfile);
data/util-linux-2.36.1/libmount/src/monitor.c:328:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		len = read(me->fd, buf, sizeof(buf));
data/util-linux-2.36.1/libmount/src/optstr.c:137:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namesz = strlen(name);
data/util-linux-2.36.1/libmount/src/optstr.c:189:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	osz = *optstr ? strlen(*optstr) : 0;
data/util-linux-2.36.1/libmount/src/optstr.c:238:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nsz = strlen(name);
data/util-linux-2.36.1/libmount/src/optstr.c:239:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	vsz = value ? strlen(value) : 0;
data/util-linux-2.36.1/libmount/src/optstr.c:341:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t shift = strlen(*optstr);
data/util-linux-2.36.1/libmount/src/optstr.c:346:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				shift -= strlen(*optstr);
data/util-linux-2.36.1/libmount/src/optstr.c:375:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(end);
data/util-linux-2.36.1/libmount/src/optstr.c:388:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t subsz = strlen(substr);			/* substring size */
data/util-linux-2.36.1/libmount/src/optstr.c:389:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t strsz = strlen(*str);
data/util-linux-2.36.1/libmount/src/optstr.c:390:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t possz = strlen(pos);
data/util-linux-2.36.1/libmount/src/optstr.c:468:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if (value && ol.value && strlen(value) == ol.valsz)
data/util-linux-2.36.1/libmount/src/optstr.c:922:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen((char *) raw);
data/util-linux-2.36.1/libmount/src/optstr.c:1135:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = malloc(strlen(pattern) + 1);
data/util-linux-2.36.1/libmount/src/tab.c:1269:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t optvalsz = 0, valsz = val ? strlen(val) : 0;
data/util-linux-2.36.1/libmount/src/tab.c:1403:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(mnt);
data/util-linux-2.36.1/libmount/src/tab_parse.c:476:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t sz = str ? strlen(str) : 0;
data/util-linux-2.36.1/libmount/src/tab_parse.c:890:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namesz = strlen(d->d_name);
data/util-linux-2.36.1/libmount/src/utils.c:50:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	al = strlen(*a);
data/util-linux-2.36.1/libmount/src/utils.c:51:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bl = strlen(b);
data/util-linux-2.36.1/libmount/src/utils.c:202:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			memmove(*filename, last, strlen(last) + 1);
data/util-linux-2.36.1/libmount/src/utils.c:929:12:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	oldmode = umask(S_IRGRP|S_IWGRP|S_IXGRP|
data/util-linux-2.36.1/libmount/src/utils.c:934:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(oldmode);
data/util-linux-2.36.1/libmount/src/utils.c:1050:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(buf);
data/util-linux-2.36.1/libmount/src/utils.c:1054:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/util-linux-2.36.1/libmount/src/utils.c:1216:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ret = read(fd, bufptr, bufmax - *bufsiz);
data/util-linux-2.36.1/libsmartcols/src/buffer.c:60:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(str);
data/util-linux-2.36.1/libsmartcols/src/print.c:510:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bytes = strlen(data);
data/util-linux-2.36.1/libsmartcols/src/print.c:719:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = bufsz = strlen(tb->title.data) + 1;
data/util-linux-2.36.1/libsmartcols/src/print.c:726:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bufsz = mbs_safe_encode_size(strlen(tb->title.data)) + 1;
data/util-linux-2.36.1/libsmartcols/src/print.c:964:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sz += data ? strlen(data) : 0;
data/util-linux-2.36.1/libsmartcols/src/print.c:1025:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		extra_bufsz += tb->nlines * strlen(vertical_symbol(tb));
data/util-linux-2.36.1/libsmartcols/src/print.c:1044:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			extra_bufsz += strlen(scols_cell_get_data(&cl->header));	/* data */
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:171:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(ifr.ifr_name, ifrp->ifr_name, IFNAMSIZ);
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:237:16:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		save_umask = umask(0);
data/util-linux-2.36.1/libuuid/src/gen_uuid.c:239:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		(void) umask(save_umask);
data/util-linux-2.36.1/libuuid/src/parse.c:44:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(in);
data/util-linux-2.36.1/libuuid/src/test_uuid.c:78:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((sz = read(fd, str, sizeof(str))) != 0) {
data/util-linux-2.36.1/login-utils/ch-common.c:24:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t len = strlen(str);
data/util-linux-2.36.1/login-utils/chfn.c:120:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t len = strlen(gecos);
data/util-linux-2.36.1/login-utils/chsh.c:132:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(text);
data/util-linux-2.36.1/login-utils/islocal.c:42:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((chin = getc(f)) != EOF) {
data/util-linux-2.36.1/login-utils/login.c:195:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ignore_result( write(STDERR_FILENO, timeout_msg, strlen(timeout_msg)) );
data/util-linux-2.36.1/login-utils/login.c:261:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namesz = strlen(d->d_name);
data/util-linux-2.36.1/login-utils/login.c:777:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(host) + 1 + strlen(dflt_prompt) + 1;
data/util-linux-2.36.1/login-utils/login.c:777:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(host) + 1 + strlen(dflt_prompt) + 1;
data/util-linux-2.36.1/login-utils/logindefs.c:115:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t n = strlen(buf);
data/util-linux-2.36.1/login-utils/logindefs.c:145:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		p = data + strlen(data);
data/util-linux-2.36.1/login-utils/logindefs.c:413:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t sz = strlen(name);
data/util-linux-2.36.1/login-utils/logindefs.c:509:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					buf[strlen(buf) - 1] = '\0';
data/util-linux-2.36.1/login-utils/logindefs.c:521:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(pwd->pw_dir) + strlen(file) + 2 > sizeof(buf))
data/util-linux-2.36.1/login-utils/logindefs.c:521:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(pwd->pw_dir) + strlen(file) + 2 > sizeof(buf))
data/util-linux-2.36.1/login-utils/lslogins.c:339:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (*(s = buf + strlen(buf) - 1) == '\n')
data/util-linux-2.36.1/login-utils/lslogins.c:1299:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			printf("%s:%*c%-36s\n", hstr, 35 - (int)strlen(hstr), ' ', dstr);
data/util-linux-2.36.1/login-utils/newgrp.c:154:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		explicit_bzero(xpwd, strlen(xpwd));
data/util-linux-2.36.1/login-utils/newgrp.c:156:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		xmemset_s(xpwd, strlen(xpwd), 0);
data/util-linux-2.36.1/login-utils/nologin.c:103:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((rd = read(fd, buf, sizeof(buf))) > 0)
data/util-linux-2.36.1/login-utils/setpwnam.c:101:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen = strlen(pwd->pw_name);
data/util-linux-2.36.1/login-utils/setpwnam.c:111:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		contlen = strlen(linebuf);
data/util-linux-2.36.1/login-utils/setpwnam.c:124:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			contlen = strlen(linebuf);
data/util-linux-2.36.1/login-utils/setpwnam.c:215:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(0);
data/util-linux-2.36.1/login-utils/su-common.c:804:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		arg0 = xmalloc(strlen(shell_basename) + 2);
data/util-linux-2.36.1/login-utils/sulogin-consoles.c:67:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define strsize(string)		(strlen((string))+1)
data/util-linux-2.36.1/login-utils/sulogin.c:345:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(id, pass, off);
data/util-linux-2.36.1/login-utils/sulogin.c:358:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(s);
data/util-linux-2.36.1/login-utils/sulogin.c:383:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(pass) != 13)
data/util-linux-2.36.1/login-utils/sulogin.c:639:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read(fd, &c, 1) < 1) {
data/util-linux-2.36.1/login-utils/sulogin.c:759:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(home, "/");
data/util-linux-2.36.1/login-utils/utmpdump.c:181:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		length = read(fd, buf, sizeof(buf));
data/util-linux-2.36.1/login-utils/utmpdump.c:261:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(dest, line, size);
data/util-linux-2.36.1/login-utils/vipw.c:96:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((nr = read(from, buf, sizeof(buf))) > 0)
data/util-linux-2.36.1/login-utils/vipw.c:135:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void)umask(0);
data/util-linux-2.36.1/misc-utils/blkid.c:123:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(cp);
data/util-linux-2.36.1/misc-utils/blkid.c:146:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(str) + left_len;
data/util-linux-2.36.1/misc-utils/blkid.c:253:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t namelen = strlen(name);
data/util-linux-2.36.1/misc-utils/blkid.c:367:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		print_value(ctl, num++, devname, value, type, strlen(value));
data/util-linux-2.36.1/misc-utils/blkid.c:383:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t asz = a ? strlen(a) : 0;
data/util-linux-2.36.1/misc-utils/blkid.c:384:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t bsz = b ? strlen(b) : 0;
data/util-linux-2.36.1/misc-utils/blkid.c:836:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!ctl.lowprobe && !ctl.eval && blkid_get_cache(&cache, read) < 0)
data/util-linux-2.36.1/misc-utils/cal.c:704:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat(cur_dh++, " ");
data/util-linux-2.36.1/misc-utils/cal.c:717:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (ctl->week_width < strlen(ctl->full_month[i]) + year_len)
data/util-linux-2.36.1/misc-utils/findmnt-verify.c:115:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(n_tgt);
data/util-linux-2.36.1/misc-utils/getopt.c:129:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = xmalloc(strlen(arg) * 4 + 3);
data/util-linux-2.36.1/misc-utils/getopt.c:288:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(tokptr);
data/util-linux-2.36.1/misc-utils/getopt.c:404:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ctl.optstr = xmalloc(strlen(argv[1]) + 1);
data/util-linux-2.36.1/misc-utils/hardlink.c:187:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t namelen = strlen(name);
data/util-linux-2.36.1/misc-utils/hardlink.c:231:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read(fd, buf, cksumsize) != cksumsize) {
data/util-linux-2.36.1/misc-utils/hardlink.c:289:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					if ((xsz = read(fd, ctl->iobuf1, rsize)) != rsize)
data/util-linux-2.36.1/misc-utils/hardlink.c:291:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					else if ((xsz = read(fd2, ctl->iobuf2, rsize)) != rsize)
data/util-linux-2.36.1/misc-utils/hardlink.c:322:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					const size_t suffixlen = strlen(suffix);
data/util-linux-2.36.1/misc-utils/hardlink.c:323:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					size_t n2len = strlen(n2);
data/util-linux-2.36.1/misc-utils/hardlink.c:479:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t nam1baselen = strlen(dp->name);
data/util-linux-2.36.1/misc-utils/hardlink.c:502:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					      (PCRE2_SPTR) di->d_name, strlen(di->d_name), 0, /* start at offset 0 */
data/util-linux-2.36.1/misc-utils/hardlink.c:518:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					     strlen(di->d_name)));
data/util-linux-2.36.1/misc-utils/kill.c:139:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lth = 1 + strlen(signame);
data/util-linux-2.36.1/misc-utils/logger.c:245:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(path) >= sizeof(s_addr.sun_path))
data/util-linux-2.36.1/misc-utils/logger.c:440:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		v->iov_len = len ? len : strlen(str);	\
data/util-linux-2.36.1/misc-utils/logger.c:464:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = xasprintf(&octet, "%zu ", strlen(ctl->hdr) + strlen(msg));
data/util-linux-2.36.1/misc-utils/logger.c:464:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = xasprintf(&octet, "%zu ", strlen(ctl->hdr) + strlen(msg));
data/util-linux-2.36.1/misc-utils/logger.c:800:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (255 < strlen(hostname))
data/util-linux-2.36.1/misc-utils/logger.c:806:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (48 < strlen(ctl->tag))
data/util-linux-2.36.1/misc-utils/logger.c:956:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(*argv);
data/util-linux-2.36.1/misc-utils/logger.c:985:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t max_usrmsg_size = ctl->max_message_size - strlen(ctl->hdr);
data/util-linux-2.36.1/misc-utils/logger.c:991:6:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	c = getchar();
data/util-linux-2.36.1/misc-utils/logger.c:997:23:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while (isdigit(c = getchar()) && pri <= 191) {
data/util-linux-2.36.1/misc-utils/logger.c:1015:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				    ctl->max_message_size - strlen(ctl->hdr);
data/util-linux-2.36.1/misc-utils/logger.c:1019:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				c = getchar();
data/util-linux-2.36.1/misc-utils/logger.c:1024:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			c = getchar();
data/util-linux-2.36.1/misc-utils/logger.c:1036:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			c = getchar();
data/util-linux-2.36.1/misc-utils/look.c:186:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		stringlen = strlen(string);
data/util-linux-2.36.1/misc-utils/lsblk-properties.c:140:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(pattern);
data/util-linux-2.36.1/misc-utils/lsblk.c:522:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sz = strlen(sub);
data/util-linux-2.36.1/misc-utils/lsblk.c:2003:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				lsblk->tree_id = column_name_to_id(optarg, strlen(optarg));
data/util-linux-2.36.1/misc-utils/lsblk.c:2010:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lsblk->dedup_id = column_name_to_id(optarg, strlen(optarg));
data/util-linux-2.36.1/misc-utils/lsblk.c:2017:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lsblk->sort_id = column_name_to_id(optarg, strlen(optarg));
data/util-linux-2.36.1/misc-utils/lslocks.c:184:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((len = strlen(path)) >= (sizeof(path) - 2))
data/util-linux-2.36.1/misc-utils/lslocks.c:258:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				tok[strlen(tok) - 1] = '\0';
data/util-linux-2.36.1/misc-utils/lslocks.c:301:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				tok[strlen(tok)-1] = '\0';
data/util-linux-2.36.1/misc-utils/namei.c:128:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(dirname);
data/util-linux-2.36.1/misc-utils/rename.c:56:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*newname = xmalloc(strlen(orig) + strlen(to) + 1);
data/util-linux-2.36.1/misc-utils/rename.c:56:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*newname = xmalloc(strlen(orig) + strlen(to) + 1);
data/util-linux-2.36.1/misc-utils/rename.c:63:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p = where + strlen(from);
data/util-linux-2.36.1/misc-utils/rename.c:76:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((c = fgetc(stdin)) == EOF) {
data/util-linux-2.36.1/misc-utils/rename.c:94:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while ((c = fgetc(stdin)) != '\n' && c != EOF);
data/util-linux-2.36.1/misc-utils/uuidd.c:121:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(socket_path) < sizeof(srv_addr.sun_path));
data/util-linux-2.36.1/misc-utils/uuidd.c:255:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(socket_path) < sizeof(my_addr.sun_path));
data/util-linux-2.36.1/misc-utils/uuidd.c:258:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	save_umask = umask(0);
data/util-linux-2.36.1/misc-utils/uuidd.c:265:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(save_umask);
data/util-linux-2.36.1/misc-utils/uuidd.c:285:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bytes = read(fd, &info, sizeof(info));
data/util-linux-2.36.1/misc-utils/uuidd.c:367:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			write_all(fd_pidfile, reply_buf, strlen(reply_buf));
data/util-linux-2.36.1/misc-utils/uuidd.c:433:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		len = read(ns, &op, 1);
data/util-linux-2.36.1/misc-utils/uuidd.c:455:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			reply_len = strlen(reply_buf) + 1;
data/util-linux-2.36.1/misc-utils/uuidd.c:459:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			reply_len = strlen(reply_buf) + 1;
data/util-linux-2.36.1/misc-utils/uuidd.c:641:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(socket_path) >= sizeof(((struct sockaddr_un *)0)->sun_path))
data/util-linux-2.36.1/misc-utils/uuidgen.c:162:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		namelen = strlen(name);
data/util-linux-2.36.1/misc-utils/whereis.c:395:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int i = strlen(dp);
data/util-linux-2.36.1/sys-utils/chmem.c:136:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (!enable && strncasecmp(line, zn, strlen(zn)) != 0)
data/util-linux-2.36.1/sys-utils/chmem.c:221:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (!enable && strncasecmp(line, zn, strlen(zn)) != 0) {
data/util-linux-2.36.1/sys-utils/chmem.c:279:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (isdigit(str[strlen(str) - 1]))
data/util-linux-2.36.1/sys-utils/chmem.c:295:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(start) < 2 || start[1] != 'x')
data/util-linux-2.36.1/sys-utils/chmem.c:297:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(end) < 2 || end[1] != 'x')
data/util-linux-2.36.1/sys-utils/dmesg.c:344:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/util-linux-2.36.1/sys-utils/dmesg.c:384:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/util-linux-2.36.1/sys-utils/dmesg.c:998:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ctl->indent += strlen(fpbuf);
data/util-linux-2.36.1/sys-utils/dmesg.c:1039:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			mesg_size = strlen(line);
data/util-linux-2.36.1/sys-utils/dmesg.c:1073:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			mesg_size = strlen(line);
data/util-linux-2.36.1/sys-utils/dmesg.c:1107:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		size = read(ctl->kmsg, ctl->kmsg_buf,
data/util-linux-2.36.1/sys-utils/eject.c:515:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				while (str && strncmp(name, str, strlen(name)) != 0) {
data/util-linux-2.36.1/sys-utils/eject.c:875:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (ctl.device[strlen(ctl.device) - 1] == '/')
data/util-linux-2.36.1/sys-utils/eject.c:876:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ctl.device[strlen(ctl.device) - 1] = '\0';
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:1124:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define yystrlen strlen
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2747:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	wordlen = strlen (word);
data/util-linux-2.36.1/sys-utils/hwclock-parse-date.c:2994:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t tzsize = strlen (tz) + 1;
data/util-linux-2.36.1/sys-utils/ipcutils.c:115:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (fgetc(f) != '\n');		/* skip header */
data/util-linux-2.36.1/sys-utils/ipcutils.c:263:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (fgetc(f) != '\n') ;	/* skip header */
data/util-linux-2.36.1/sys-utils/ipcutils.c:371:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (fgetc(f) != '\n') ;	/* skip header */
data/util-linux-2.36.1/sys-utils/ipcutils.c:502:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if (msg[strlen(msg) - 1] == '=')
data/util-linux-2.36.1/sys-utils/irq-common.c:239:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(line);
data/util-linux-2.36.1/sys-utils/irqtop.c:182:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (read(tfd, &unused, sizeof(unused)) < 0)
data/util-linux-2.36.1/sys-utils/irqtop.c:185:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (read(sfd, &siginfo, sizeof(siginfo)) < 0) {
data/util-linux-2.36.1/sys-utils/irqtop.c:202:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (read(STDIN_FILENO, &c, 1) != 1)
data/util-linux-2.36.1/sys-utils/ldattach.c:460:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write_all(tty_fd, introparm, strlen(introparm)) != 0)
data/util-linux-2.36.1/sys-utils/lscpu-dmi.c:87:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bp += strlen(bp);
data/util-linux-2.36.1/sys-utils/lscpu.c:269:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(pattern);
data/util-linux-2.36.1/sys-utils/lscpu.c:295:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(line) - 1;
data/util-linux-2.36.1/sys-utils/lscpu.c:768:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			i += strlen(&buf[i]);
data/util-linux-2.36.1/sys-utils/lscpu.c:803:8:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			if (fscanf(fd, "%255s", buf) == 1 && !strcmp(buf, "full"))
data/util-linux-2.36.1/sys-utils/lscpu.c:967:8:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			if (fscanf(fd, "%255s", buf) == 1 &&
data/util-linux-2.36.1/sys-utils/lscpu.c:1011:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			str += strlen(str) - 1;
data/util-linux-2.36.1/sys-utils/lscpu.c:1015:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				memmove(str, str + 1, strlen(str));
data/util-linux-2.36.1/sys-utils/lsipc.c:416:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			printf("%s:%*c%-36s\n", hstr, 35 - (int)strlen(hstr), ' ', dstr);
data/util-linux-2.36.1/sys-utils/lsipc.c:456:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (*(s = buf + strlen(buf) - 1) == '\n')
data/util-linux-2.36.1/sys-utils/lsipc.c:997:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					arg = xcalloc(1, sizeof(char) * strlen(_("dest"))
data/util-linux-2.36.1/sys-utils/lsipc.c:998:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							+ strlen(_("locked"))
data/util-linux-2.36.1/sys-utils/lsipc.c:999:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							+ strlen(_("hugetlb"))
data/util-linux-2.36.1/sys-utils/lsipc.c:1000:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							+ strlen(_("noreserve")) + 4);
data/util-linux-2.36.1/sys-utils/lsmem.c:287:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (strlen(valid_zones) +
data/util-linux-2.36.1/sys-utils/lsmem.c:288:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen(zone_names[zone_id]) > BUFSIZ - 2)
data/util-linux-2.36.1/sys-utils/lsmem.c:292:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
						strcat(valid_zones, "/");
data/util-linux-2.36.1/sys-utils/lsns.c:653:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	elt_len = strlen(elt);
data/util-linux-2.36.1/sys-utils/lsns.c:654:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	path_set_len = strlen(path_set);
data/util-linux-2.36.1/sys-utils/readprofile.c:66:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(name);
data/util-linux-2.36.1/sys-utils/readprofile.c:93:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(BOOT_SYSTEM_MAP) + strlen(uname_info.release) + 1;
data/util-linux-2.36.1/sys-utils/readprofile.c:93:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(BOOT_SYSTEM_MAP) + strlen(uname_info.release) + 1;
data/util-linux-2.36.1/sys-utils/readprofile.c:254:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read(proFd, buf, len);
data/util-linux-2.36.1/sys-utils/rfkill.c:208:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t	len = read(fd, event, sizeof(*event));
data/util-linux-2.36.1/sys-utils/rtcwake.c:257:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ss = read(fd, &buf, sizeof(buf) - 1);
data/util-linux-2.36.1/sys-utils/rtcwake.c:639:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				t = read(fd, &data, sizeof data);
data/util-linux-2.36.1/sys-utils/setpriv.c:263:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	len = read(fd, buf, sizeof(buf));
data/util-linux-2.36.1/sys-utils/setpriv.c:630:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(label);
data/util-linux-2.36.1/sys-utils/swapon.c:432:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	datasz = read(fd, buf, MAX_PAGESIZE);
data/util-linux-2.36.1/sys-utils/unshare.c:115:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_all(fd, cmd, strlen(cmd)))
data/util-linux-2.36.1/sys-utils/unshare.c:130:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_all(fd, buf, strlen(buf)))
data/util-linux-2.36.1/term-utils/agetty.c:442:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(options.initstring));
data/util-linux-2.36.1/term-utils/agetty.c:466:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while (read(STDIN_FILENO, &ch, 1) == 1) {
data/util-linux-2.36.1/term-utils/agetty.c:577:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t usz = username ? strlen(username) : 0;
data/util-linux-2.36.1/term-utils/agetty.c:587:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sz = strlen(str);
data/util-linux-2.36.1/term-utils/agetty.c:697:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define is_speed(str) (strlen((str)) == strspn((str), "0123456789,"))
data/util-linux-2.36.1/term-utils/agetty.c:919:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strspn(op->tty + 3, "0123456789") == strlen(op->tty+3))
data/util-linux-2.36.1/term-utils/agetty.c:996:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(line);
data/util-linux-2.36.1/term-utils/agetty.c:1454:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((nread = read(STDIN_FILENO, buf, sizeof(buf) - 1)) > 0) {
data/util-linux-2.36.1/term-utils/agetty.c:1515:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t varsz = strlen(varname);
data/util-linux-2.36.1/term-utils/agetty.c:1725:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while (read(inotify_fd, buffer, sizeof (buffer)) > 0);
data/util-linux-2.36.1/term-utils/agetty.c:1746:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namesz = strlen(d->d_name);
data/util-linux-2.36.1/term-utils/agetty.c:1845:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((c = getc(f)) != EOF) {
data/util-linux-2.36.1/term-utils/agetty.c:1847:28:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			output_special_char(ie, getc(f), op, tp, f);
data/util-linux-2.36.1/term-utils/agetty.c:2045:3:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		getc(stdin);
data/util-linux-2.36.1/term-utils/agetty.c:2099:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			write_all(STDOUT_FILENO, cn, strlen(cn));
data/util-linux-2.36.1/term-utils/agetty.c:2196:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			readres = read(STDIN_FILENO, &c, 1);
data/util-linux-2.36.1/term-utils/agetty.c:2527:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		write_all(fd, buf, strlen(buf));
data/util-linux-2.36.1/term-utils/agetty.c:2655:10:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int c = fgetc(fd);
data/util-linux-2.36.1/term-utils/agetty.c:2663:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(fd);
data/util-linux-2.36.1/term-utils/agetty.c:2862:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	op->initstring = malloc(strlen(arg) + 1);
data/util-linux-2.36.1/term-utils/agetty.c:2914:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dsz = strlen(dest);
data/util-linux-2.36.1/term-utils/agetty.c:2916:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ssz = strlen(sep);
data/util-linux-2.36.1/term-utils/agetty.c:2917:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(src);
data/util-linux-2.36.1/term-utils/agetty.c:2943:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(nm) > 42)
data/util-linux-2.36.1/term-utils/script-playutils.c:85:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((c = fgetc(f)) != EOF && c != '\n');
data/util-linux-2.36.1/term-utils/script-playutils.c:195:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(stp->timing_fp);
data/util-linux-2.36.1/term-utils/script-playutils.c:330:8:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		rc = fscanf(f, "%128s", buf);		/* name */
data/util-linux-2.36.1/term-utils/scriptreplay.c:118:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(buf);
data/util-linux-2.36.1/term-utils/setterm.c:801:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(fd, header, 4) != 4)
data/util-linux-2.36.1/term-utils/setterm.c:811:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read(fd, inbuf, rows * cols * 2);
data/util-linux-2.36.1/term-utils/setterm.c:907:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write_all(STDIN_FILENO, getpos, strlen(getpos)) < 0) {
data/util-linux-2.36.1/term-utils/setterm.c:916:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		     read(STDIN_FILENO, retstr + pos,
data/util-linux-2.36.1/term-utils/wall.c:292:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(s);
data/util-linux-2.36.1/term-utils/wall.c:371:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		date[strlen(date) - 1] = '\0';
data/util-linux-2.36.1/term-utils/write.c:182:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (memcmp(u->ut_line, ctl->src_tty_name, strlen(ctl->src_tty_name) + 1) == 0) {
data/util-linux-2.36.1/text-utils/colcrt.c:104:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = wcslen(s);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:426:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pr->fmt = xmalloc(strlen(fmtp) + strlen(cs) + 1);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:426:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pr->fmt = xmalloc(strlen(fmtp) + strlen(cs) + 1);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:499:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cfmt += strlen(clr);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:544:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cfmt += strlen(hcnext->str);
data/util-linux-2.36.1/text-utils/hexdump-parse.c:591:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (hcnext->str && (int)strlen(hcnext->str) != hcnext->range)
data/util-linux-2.36.1/text-utils/more.c:375:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int ret = getc(ctl->current_file);
data/util-linux-2.36.1/text-utils/more.c:795:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read(STDERR_FILENO, &c, 1) <= 0) {
data/util-linux-2.36.1/text-utils/more.c:813:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((ilen = read(STDERR_FILENO, &input, sizeof(input))) <= 0)
data/util-linux-2.36.1/text-utils/more.c:969:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ctl->prompt_len += strlen(mess);
data/util-linux-2.36.1/text-utils/more.c:1118:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	xtra = strlen(ctl->file_names[ctl->argv_position]) + strlen(ctl->shell_line) + 1;
data/util-linux-2.36.1/text-utils/more.c:1118:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	xtra = strlen(ctl->file_names[ctl->argv_position]) + strlen(ctl->shell_line) + 1;
data/util-linux-2.36.1/text-utils/more.c:1134:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				outstr += strlen(ctl->file_names[ctl->argv_position]);
data/util-linux-2.36.1/text-utils/more.c:1141:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				outstr += strlen(ctl->shell_line);
data/util-linux-2.36.1/text-utils/more.c:1360:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		sz = read(pfd[0].fd, &info, sizeof(info));
data/util-linux-2.36.1/text-utils/pg.c:307:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	write_all(STDOUT_FILENO, message, strlen(message));
data/util-linux-2.36.1/text-utils/pg.c:586:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = xmalloc(strlen(cmdstr) + 1);
data/util-linux-2.36.1/text-utils/pg.c:593:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*(buf + strlen(buf) - 1) = '\0';
data/util-linux-2.36.1/text-utils/pg.c:640:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		switch (read(STDOUT_FILENO, &key, 1)) {
data/util-linux-2.36.1/text-utils/pg.c:769:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t l = strlen(s), wl;
data/util-linux-2.36.1/text-utils/pg.c:873:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		p = cmd.cmdline + strlen(cmd.cmdline) - 1;
data/util-linux-2.36.1/text-utils/pg.c:875:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		p = cmd.cmdline + strlen(cmd.cmdline) - 2;
data/util-linux-2.36.1/text-utils/pg.c:1362:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(cmd.cmdline));
data/util-linux-2.36.1/text-utils/pg.c:1406:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(copyright));
data/util-linux-2.36.1/text-utils/pg.c:1408:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						  strlen(help));
data/util-linux-2.36.1/text-utils/pg.c:1528:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			write_all(STDOUT_FILENO, argv[arg], strlen(argv[arg]));
data/util-linux-2.36.1/text-utils/pg.c:1676:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			p = searchfor + strlen(searchfor) - 1;
data/util-linux-2.36.1/text-utils/rev.c:150:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = wcslen(buf);
data/util-linux-2.36.1/text-utils/rev.c:167:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = wcslen(buf);

ANALYSIS SUMMARY:

Hits = 2235
Lines analyzed = 193142 in approximately 4.85 seconds (39794 lines/second)
Physical Source Lines of Code (SLOC) = 137827
Hits@level = [0] 1965 [1] 441 [2] 1047 [3] 208 [4] 527 [5]  12
Hits@level+ = [0+] 4200 [1+] 2235 [2+] 1794 [3+] 747 [4+] 539 [5+]  12
Hits/KSLOC@level+ = [0+] 30.473 [1+] 16.216 [2+] 13.0163 [3+] 5.41984 [4+] 3.9107 [5+] 0.0870657
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.