Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/sigcommon.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/daemon.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/coredump.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/control.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/control.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/pid.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/dshm.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/sighandler.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/ipc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxregexp/zbxregexp.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsys/threads.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsys/symbols.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsys/mutexs.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_dump.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/lld_macro.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/maintenance.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/dbschema.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/item.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/trigger.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json_parser.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json_parser.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag_proxy.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag_server.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcompress/compress.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxmodules/modules.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/httprequest.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/global.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/httprequest.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/global.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/zabbix.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/zabbix.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/urlencode.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/http.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxself/selfmon.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_version.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/base64.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_tcp_active.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_tcp.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/md5.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/iprange.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/alias.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/xml.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant_misc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/file.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/zabbix_stats_server.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/zabbix_stats.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/macrofunc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/macrofunc.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/zabbix_stats_proxy.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/zabbix_stats.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/disk.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/fatal.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4000.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2030.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4020.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2020.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4040.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4030.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3000.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4010.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3050.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_5000.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3040.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3020.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2050.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2040.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommshigh/comms.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/swap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/inodes.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/vmstats.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/aix.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/kernel.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/inodes.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/boottime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/netbsd.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/swap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/services.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/pdhmon.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/wmi.cpp Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/win32.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/swap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/kernel.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/inodes.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/boottime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/sensors.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/openbsd.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/kernel.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/inodes.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/boottime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/linux.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/ntp.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/ntp.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/common.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/zabbix_stats.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/common.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/http.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/system.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/http.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/cpu.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/net.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/zabbix_stats.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/inodes.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/hpux.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/swap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/kernel.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/inodes.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/boottime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/solaris.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/swap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/kernel.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/osf.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/specsysinfo.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/swap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/proc.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/kernel.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/inodes.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/boottime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/freebsd.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/kernel.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/diskspace.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/memory.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/inodes.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/software.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/inodes.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/osx.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/system.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/boottime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/cpu.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/net.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/uptime.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/unknown/hostname.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/unknown/diskio.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/unknown/unknown.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/agent/agent.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/agent/agent.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/vectorimpl.h Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/hashset.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/queue.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/vector.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/evaluate.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/prediction.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/int128.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/algodefs.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/hashmap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/binaryheap.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c Examining data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c Examining data/zabbix-5.0.5+dfsg/src/modules/dummy/dummy.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/events.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/pinger/pinger.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/pinger/pinger.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/server.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/selfmon/selfmon.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/selfmon/selfmon.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxydata.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxydata.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxyconfig.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_expressions_evaluate.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxyconfig.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_expressions_evaluate.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_manager.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_worker.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_protocol.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_common.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_manager.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_protocol.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_worker.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_poller.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_manager.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_poller.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_manager.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httppoller.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httpmacro.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httpmacro.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httppoller.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/dbsyncer/dbsyncer.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/dbsyncer/dbsyncer.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal_proxy.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_aggregate.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/poller.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_agent.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple_vmware.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_external.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_aggregate.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/poller.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_http.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_db.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_telnet.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_agent.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_telnet.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple_vmware.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal_server.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_http.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_external.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_db.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_java.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_java.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/timer/timer.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/timer/timer.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter_protocol.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter_protocol.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_manager.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_manager.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/scripts/scripts.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/scripts/scripts.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/proxypoller/proxypoller.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/proxypoller/proxypoller.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/events.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/history_compress.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/history_compress.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/dbconfig/dbconfig.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/dbconfig/dbconfig.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_history.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/linked_list.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_history.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/linked_list.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/vmstats.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxkstat.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/listener.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/stats.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/vmstats.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/diskdevices.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxkstat.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zabbix_agentd.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/stats.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/metrics.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/listener.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/diskdevices.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_get/zabbix_get.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/servercomms.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/datasender/datasender.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/datasender/datasender.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxyconfig/proxyconfig.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxyconfig/proxyconfig.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/servercomms.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxy_alerter_protocol.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxy_lld.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxy.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/events.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/heart/heart.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/heart/heart.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/housekeeper/housekeeper.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/housekeeper/housekeeper.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_sender/win32/zabbix_sender.h Examining data/zabbix-5.0.5+dfsg/src/zabbix_sender/win32/zabbix_sender.c Examining data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c Examining data/zabbix-5.0.5+dfsg/build/mingw/winmeta.h Examining data/zabbix-5.0.5+dfsg/build/win32/examples/zabbix_sender/sender.c Examining data/zabbix-5.0.5+dfsg/build/win32/include/config.h Examining data/zabbix-5.0.5+dfsg/build/win32/project/zabbix_sender_desc.h Examining data/zabbix-5.0.5+dfsg/build/win32/project/zabbix_agent2_desc.h Examining data/zabbix-5.0.5+dfsg/build/win32/project/zabbix_agent_desc.h Examining data/zabbix-5.0.5+dfsg/build/win32/project/zabbix_get_desc.h Examining data/zabbix-5.0.5+dfsg/build/win32/project/resource.h Examining data/zabbix-5.0.5+dfsg/bin/win32/dev/zabbix_sender.h Examining data/zabbix-5.0.5+dfsg/bin/win64/dev/zabbix_sender.h Examining data/zabbix-5.0.5+dfsg/include/common.h Examining data/zabbix-5.0.5+dfsg/include/log.h Examining data/zabbix-5.0.5+dfsg/include/zbxdb.h Examining data/zabbix-5.0.5+dfsg/include/perfmon.h Examining data/zabbix-5.0.5+dfsg/include/service.h Examining data/zabbix-5.0.5+dfsg/include/zbxalert.h Examining data/zabbix-5.0.5+dfsg/include/zbxhttp.h Examining data/zabbix-5.0.5+dfsg/include/zbxmodules.h Examining data/zabbix-5.0.5+dfsg/include/sysinfo.h Examining data/zabbix-5.0.5+dfsg/include/proxy.h Examining data/zabbix-5.0.5+dfsg/include/ipc.h Examining data/zabbix-5.0.5+dfsg/include/preproc.h Examining data/zabbix-5.0.5+dfsg/include/zbxcompress.h Examining data/zabbix-5.0.5+dfsg/include/zbxgetopt.h Examining data/zabbix-5.0.5+dfsg/include/threads.h Examining data/zabbix-5.0.5+dfsg/include/alias.h Examining data/zabbix-5.0.5+dfsg/include/zbxembed.h Examining data/zabbix-5.0.5+dfsg/include/module.h Examining data/zabbix-5.0.5+dfsg/include/zbxdiag.h Examining data/zabbix-5.0.5+dfsg/include/pid.h Examining data/zabbix-5.0.5+dfsg/include/zbxlld.h Examining data/zabbix-5.0.5+dfsg/include/cfg.h Examining data/zabbix-5.0.5+dfsg/include/sighandler.h Examining data/zabbix-5.0.5+dfsg/include/mutexs.h Examining data/zabbix-5.0.5+dfsg/include/zbxjson.h Examining data/zabbix-5.0.5+dfsg/include/discovery.h Examining data/zabbix-5.0.5+dfsg/include/base64.h Examining data/zabbix-5.0.5+dfsg/include/db.h Examining data/zabbix-5.0.5+dfsg/include/zbxmedia.h Examining data/zabbix-5.0.5+dfsg/include/zbxregexp.h Examining data/zabbix-5.0.5+dfsg/include/md5.h Examining data/zabbix-5.0.5+dfsg/include/zbxtasks.h Examining data/zabbix-5.0.5+dfsg/include/dbcache.h Examining data/zabbix-5.0.5+dfsg/include/memalloc.h Examining data/zabbix-5.0.5+dfsg/include/zbxprometheus.h Examining data/zabbix-5.0.5+dfsg/include/zbxserver.h Examining data/zabbix-5.0.5+dfsg/include/symbols.h Examining data/zabbix-5.0.5+dfsg/include/zbxcrypto.h Examining data/zabbix-5.0.5+dfsg/include/zbxserialize.h Examining data/zabbix-5.0.5+dfsg/include/zbxhistory.h Examining data/zabbix-5.0.5+dfsg/include/export.h Examining data/zabbix-5.0.5+dfsg/include/zbxnix.h Examining data/zabbix-5.0.5+dfsg/include/disk.h Examining data/zabbix-5.0.5+dfsg/include/setproctitle.h Examining data/zabbix-5.0.5+dfsg/include/version.h Examining data/zabbix-5.0.5+dfsg/include/dbschema.h Examining data/zabbix-5.0.5+dfsg/include/zbxself.h Examining data/zabbix-5.0.5+dfsg/include/comms.h Examining data/zabbix-5.0.5+dfsg/include/telnet.h Examining data/zabbix-5.0.5+dfsg/include/daemon.h Examining data/zabbix-5.0.5+dfsg/include/zbxicmpping.h Examining data/zabbix-5.0.5+dfsg/include/sysinc.h Examining data/zabbix-5.0.5+dfsg/include/zbxalgo.h Examining data/zabbix-5.0.5+dfsg/include/zbxdbupgrade.h Examining data/zabbix-5.0.5+dfsg/include/zbxipcservice.h Examining data/zabbix-5.0.5+dfsg/include/zbxtypes.h Examining data/zabbix-5.0.5+dfsg/include/zbxexec.h FINAL RESULTS: data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:148:12: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. sub_len = readlink(linkpath, subsys_path, MAX_STRING_LEN - 1); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:154:13: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. sub_len = readlink(linkpath, subsys_path, MAX_STRING_LEN - 1); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:341:13: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. dev_len = readlink(devicepath, deviced, MAX_STRING_LEN - 1); data/zabbix-5.0.5+dfsg/include/common.h:42:8: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #ifdef snprintf data/zabbix-5.0.5+dfsg/include/common.h:43:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # undef snprintf data/zabbix-5.0.5+dfsg/include/common.h:45:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf ERROR_DO_NOT_USE_SNPRINTF_FUNCTION_TRY_TO_USE_ZBX_SNPRINTF data/zabbix-5.0.5+dfsg/include/common.h:47:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #ifdef sprintf data/zabbix-5.0.5+dfsg/include/common.h:48:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. # undef sprintf data/zabbix-5.0.5+dfsg/include/common.h:50:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define sprintf ERROR_DO_NOT_USE_SPRINTF_FUNCTION_TRY_TO_USE_ZBX_SNPRINTF data/zabbix-5.0.5+dfsg/include/common.h:57:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #ifdef strcpy data/zabbix-5.0.5+dfsg/include/common.h:58:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). # undef strcpy data/zabbix-5.0.5+dfsg/include/common.h:60:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define strcpy ERROR_DO_NOT_USE_STRCPY_FUNCTION_TRY_TO_USE_ZBX_STRLCPY data/zabbix-5.0.5+dfsg/include/common.h:62:8: [4] (buffer) vsprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #ifdef vsprintf data/zabbix-5.0.5+dfsg/include/common.h:63:9: [4] (buffer) vsprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. # undef vsprintf data/zabbix-5.0.5+dfsg/include/common.h:65:9: [4] (buffer) vsprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define vsprintf ERROR_DO_NOT_USE_VSPRINTF_FUNCTION_TRY_TO_USE_ZBX_VSNPRINTF data/zabbix-5.0.5+dfsg/include/zbxtypes.h:76:10: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/zabbix-5.0.5+dfsg/include/zbxtypes.h:76:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/zabbix-5.0.5+dfsg/include/zbxtypes.h:197:38: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. #define ZBX_OCT2UINT64(uint, string) sscanf(string, ZBX_FS_UO64, &uint) data/zabbix-5.0.5+dfsg/include/zbxtypes.h:198:38: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. #define ZBX_HEX2UINT64(uint, string) sscanf(string, ZBX_FS_UX64, &uint) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:170:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, args); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:233:16: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. *alloc_len = vsnprintf(NULL, 0, fmt, args) + 2; /* '\0' + one byte to prevent the operation retry */ data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:278:26: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. if (0 > (written_len = vsnprintf(str, count, fmt, args))) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:741:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. n = vsnprintf(string, size, f, curr); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:65:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(CONFIG_EXPORT_DIR, W_OK | R_OK)) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:143:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 == access(filename_old, F_OK) && 0 != remove(filename_old)) data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:1338:26: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define DUK_SNPRINTF snprintf data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:1339:26: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define DUK_VSNPRINTF vsnprintf data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:1345:26: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define DUK_SNPRINTF _snprintf data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2193:26: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define DUK_SPRINTF sprintf data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2197:26: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define DUK_SNPRINTF snprintf data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2200:26: [4] (buffer) vsprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define DUK_VSPRINTF vsprintf data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2204:26: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define DUK_VSNPRINTF vsnprintf data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2207:26: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. #define DUK_SSCANF sscanf data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2210:26: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. #define DUK_VSSCANF vsscanf data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:200:2: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/sh", "sh", "-c", command, NULL); data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:617:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/sh", "sh", "-c", command, NULL); data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:61:19: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (NULL == (f = popen(tmp, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:306:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (-1 == access(CONFIG_FPING_LOCATION, X_OK)) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:331:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (-1 == access(CONFIG_FPING6_LOCATION, X_OK)) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:533:19: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (NULL == (f = popen(tmp, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1472:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(path, W_OK | R_OK)) data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1540:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 == access(socket_path, F_OK)) data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1542:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(socket_path, W_OK)) data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:400:4: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(log_file, fmt, args); data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:445:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, fmt, args); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:210:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (1 != sscanf(line, "%*s " ZBX_FS_UI64, &value)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:245:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (1 != sscanf(line, "%*s " ZBX_FS_UI64, &value)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:33:26: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. # define PARSE(line) if (sscanf(line, ZBX_FS_UI64 ZBX_FS_UI64 " %*d %s " \ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:46:26: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. # define PARSE(line) if (sscanf(line, ZBX_FS_UI64 ZBX_FS_UI64 " %s " \ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:59:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(line, ZBX_FS_UI64 ZBX_FS_UI64 " %s " \ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:337:12: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (1 != fscanf(f, ZBX_FS_UI64, &freq)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:467:4: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(tmp, ZBX_FS_UI64, &curfreq); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/kernel.c:33:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (1 == sscanf(line, ZBX_FS_UI64 "\n", value)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:234:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (17 == sscanf(line, "%s\t" ZBX_FS_UI64 "\t" ZBX_FS_UI64 "\t" data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:93:14: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (1 == sscanf(tmp_line, SW_OS_OPTION_PRETTY_NAME "=\"%[^\"]", line)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:136:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (2 != sscanf(line, fmt, package, tmp) || 0 != strcmp(tmp, "install")) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:108:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (6 != sscanf(line, "%u %u %*s " \ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:171:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (2 != sscanf(line + 5, ZBX_FS_UI64 " " ZBX_FS_UI64, &result->rpag, &result->wpag)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:176:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(line + 7, ZBX_FS_UI64, &result->rpag); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:181:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(line + 8, ZBX_FS_UI64, &result->wpag); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:80:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DWORD access; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:139:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. hProcess = OpenProcess(access, FALSE, pe32.th32ProcessID); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:307:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DWORD access; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:401:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (NULL != (hProcess = OpenProcess(access, FALSE, pe32.th32ProcessID))) data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:452:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(line, "%*s " ZBX_FS_UI64 " " ZBX_FS_UI64 " " ZBX_FS_UI64 " " ZBX_FS_UI64 data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:1709:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(directory, X_OK)) data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_manager.c:1370:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 == access(*cmd, X_OK)) data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_external.c:63:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (-1 == access(cmd, X_OK)) data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c:583:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. else if (0 != access(CONFIG_SNMPTRAP_FILE, R_OK)) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:273:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if (getenv ("POSIXLY_CORRECT") != NULL) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:627:11: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt (argc, argv, "abc:d:0123456789"); data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:361:11: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if (0 == CreateProcess(NULL, wcmd, NULL, NULL, TRUE, CREATE_SUSPENDED, NULL, NULL, &si, &pi)) data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:361:11: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if (0 == CreateProcess(NULL, wcmd, NULL, NULL, TRUE, CREATE_SUSPENDED, NULL, NULL, &si, &pi)) data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:557:11: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if (0 == CreateProcess( data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:557:11: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if (0 == CreateProcess( data/zabbix-5.0.5+dfsg/src/modules/dummy/dummy.c:188:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:252:9: [3] (misc) LoadLibraryEx: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. res = LoadLibraryEx(dll_name, NULL, LOAD_LIBRARY_AS_DATAFILE); data/zabbix-5.0.5+dfsg/include/common.h:38:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define va_copy(d, s) memcpy(&d, &s, sizeof(va_list)) data/zabbix-5.0.5+dfsg/include/common.h:82:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char ZABBIX_SERVICE_NAME[ZBX_SERVICE_NAME_LEN]; data/zabbix-5.0.5+dfsg/include/common.h:83:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char ZABBIX_EVENT_SOURCE[ZBX_SERVICE_NAME_LEN]; data/zabbix-5.0.5+dfsg/include/comms.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_stat[ZBX_STAT_BUF_LEN]; data/zabbix-5.0.5+dfsg/include/comms.h:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peer[MAX_ZBX_DNSNAME_LEN + 1]; data/zabbix-5.0.5+dfsg/include/db.h:515:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[ITEM_KEY_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/include/db.h:518:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char color[GRAPH_ITEM_COLOR_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip_orig[INTERFACE_IP_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dns_orig[INTERFACE_DNS_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_orig[INTERFACE_PORT_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip_orig[INTERFACE_IP_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dns_orig[INTERFACE_DNS_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_orig[INTERFACE_PORT_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[HOST_HOST_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[HOST_NAME_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/include/dbcache.h:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipmi_username[HOST_IPMI_USERNAME_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipmi_password[HOST_IPMI_PASSWORD_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_issuer[HOST_TLS_ISSUER_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_subject[HOST_TLS_SUBJECT_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_psk_identity[HOST_TLS_PSK_IDENTITY_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_psk[HOST_TLS_PSK_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[HOST_ERROR_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char snmp_error[HOST_ERROR_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:138:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipmi_error[HOST_ERROR_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jmx_error[HOST_ERROR_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_orig[ITEM_KEY_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *key; data/zabbix-5.0.5+dfsg/include/dbcache.h:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trapper_hosts[ITEM_TRAPPER_HOSTS_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logtimefmt[ITEM_LOGTIMEFMT_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char snmp_community_orig[ITEM_SNMP_COMMUNITY_LEN_MAX], *snmp_community; data/zabbix-5.0.5+dfsg/include/dbcache.h:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char snmp_oid_orig[ITEM_SNMP_OID_LEN_MAX], *snmp_oid; data/zabbix-5.0.5+dfsg/include/dbcache.h:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char snmpv3_securityname_orig[ITEM_SNMPV3_SECURITYNAME_LEN_MAX], *snmpv3_securityname; data/zabbix-5.0.5+dfsg/include/dbcache.h:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char snmpv3_authpassphrase_orig[ITEM_SNMPV3_AUTHPASSPHRASE_LEN_MAX], *snmpv3_authpassphrase; data/zabbix-5.0.5+dfsg/include/dbcache.h:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char snmpv3_privpassphrase_orig[ITEM_SNMPV3_PRIVPASSPHRASE_LEN_MAX], *snmpv3_privpassphrase; data/zabbix-5.0.5+dfsg/include/dbcache.h:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipmi_sensor[ITEM_IPMI_SENSOR_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char username_orig[ITEM_USERNAME_LEN_MAX], *username; data/zabbix-5.0.5+dfsg/include/dbcache.h:189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char publickey_orig[ITEM_PUBLICKEY_LEN_MAX], *publickey; data/zabbix-5.0.5+dfsg/include/dbcache.h:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char privatekey_orig[ITEM_PRIVATEKEY_LEN_MAX], *privatekey; data/zabbix-5.0.5+dfsg/include/dbcache.h:191:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char password_orig[ITEM_PASSWORD_LEN_MAX], *password; data/zabbix-5.0.5+dfsg/include/dbcache.h:192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char snmpv3_contextname_orig[ITEM_SNMPV3_CONTEXTNAME_LEN_MAX], *snmpv3_contextname; data/zabbix-5.0.5+dfsg/include/dbcache.h:193:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jmx_endpoint_orig[ITEM_JMX_ENDPOINT_LEN_MAX], *jmx_endpoint; data/zabbix-5.0.5+dfsg/include/dbcache.h:194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timeout_orig[ITEM_TIMEOUT_LEN_MAX], *timeout; data/zabbix-5.0.5+dfsg/include/dbcache.h:195:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char url_orig[ITEM_URL_LEN_MAX], *url; data/zabbix-5.0.5+dfsg/include/dbcache.h:196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query_fields_orig[ITEM_QUERY_FIELDS_LEN_MAX], *query_fields; data/zabbix-5.0.5+dfsg/include/dbcache.h:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char status_codes_orig[ITEM_STATUS_CODES_LEN_MAX], *status_codes; data/zabbix-5.0.5+dfsg/include/dbcache.h:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char http_proxy_orig[ITEM_HTTP_PROXY_LEN_MAX], *http_proxy; data/zabbix-5.0.5+dfsg/include/dbcache.h:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ssl_cert_file_orig[ITEM_SSL_CERT_FILE_LEN_MAX], *ssl_cert_file; data/zabbix-5.0.5+dfsg/include/dbcache.h:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ssl_key_file_orig[ITEM_SSL_KEY_FILE_LEN_MAX], *ssl_key_file; data/zabbix-5.0.5+dfsg/include/dbcache.h:203:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ssl_key_password_orig[ITEM_SSL_KEY_PASSWORD_LEN_MAX], *ssl_key_password; data/zabbix-5.0.5+dfsg/include/dbcache.h:280:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[HOST_HOST_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:288:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_orig[INTERFACE_ADDR_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:289:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port_orig[INTERFACE_PORT_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_issuer[HOST_TLS_ISSUER_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_subject[HOST_TLS_SUBJECT_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_psk_identity[HOST_TLS_PSK_IDENTITY_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_psk[HOST_TLS_PSK_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/dbcache.h:303:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proxy_address[HOST_PROXY_ADDRESS_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/discovery.h:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dns[INTERFACE_DNS_LEN_MAX]; data/zabbix-5.0.5+dfsg/include/discovery.h:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_DISCOVERED_VALUE_SIZE]; data/zabbix-5.0.5+dfsg/include/perfmon.h:59:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t name[PDH_MAX_COUNTER_NAME]; data/zabbix-5.0.5+dfsg/include/sysinfo.h:334:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fsname[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/include/sysinfo.h:335:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fstype[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/include/zbxalgo.h:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char padding[sizeof(void *) - sizeof(zbx_hash_t)]; data/zabbix-5.0.5+dfsg/include/zbxalgo.h:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[1]; data/zabbix-5.0.5+dfsg/include/zbxipcservice.h:55:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rx_buffer[ZBX_IPC_SOCKET_BUFFER_SIZE]; data/zabbix-5.0.5+dfsg/include/zbxjson.h:235:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_stat[ZBX_JSON_STAT_BUF_LEN]; data/zabbix-5.0.5+dfsg/include/zbxserialize.h:36:46: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define zbx_serialize_uint64(buffer, value) (memcpy(buffer, &value, sizeof(zbx_uint64_t)), sizeof(zbx_uint64_t)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:38:43: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define zbx_serialize_int(buffer, value) (memcpy(buffer, (int *)&value, sizeof(int)), sizeof(int)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:40:45: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define zbx_serialize_short(buffer, value) (memcpy(buffer, (short *)&value, sizeof(short)), sizeof(short)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:42:46: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define zbx_serialize_double(buffer, value) (memcpy(buffer, (double *)&value, sizeof(double)), sizeof(double)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:56:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, (zbx_uint32_t *)&len, sizeof(zbx_uint32_t)), \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:57:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + sizeof(zbx_uint32_t), value, len), \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:62:45: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define zbx_serialize_value(buffer, value) (memcpy(buffer, &value, sizeof(value)), sizeof(value)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:67:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (memcpy(value, buffer, sizeof(zbx_uint64_t)), sizeof(zbx_uint64_t)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:70:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (memcpy(value, buffer, sizeof(int)), sizeof(int)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:73:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (memcpy(value, buffer, sizeof(short)), sizeof(short)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:79:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (memcpy(value, buffer, sizeof(double)), sizeof(double)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:83:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&value_len, buffer, sizeof(zbx_uint32_t)), \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:86:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*(value), buffer + sizeof(zbx_uint32_t), value_len), \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:94:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&value_len, buffer, sizeof(zbx_uint32_t)), \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(value, buffer + sizeof(zbx_uint32_t), value_len), \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:102:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&value_len, buffer, sizeof(zbx_uint32_t)), \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:108:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (memcpy(value, buffer, sizeof(*value)), sizeof(*value)) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:113:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&value_len, buffer, sizeof(zbx_uint32_t)), \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:115:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*(value), buffer, value_len + sizeof(zbx_uint32_t)), \ data/zabbix-5.0.5+dfsg/include/zbxtypes.h:45:36: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define zbx_open(pathname, flags) open(pathname, flags | O_BINARY) data/zabbix-5.0.5+dfsg/include/zbxtypes.h:48:36: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define zbx_open(pathname, flags) open(pathname, flags) data/zabbix-5.0.5+dfsg/include/zbxtypes.h:200:57: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). #define ZBX_STR2UCHAR(var, string) var = (unsigned char)atoi(string) data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/evaluate.c:159:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *unknown_idx = atoi(p0); data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/hashset.c:231:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)entry->data + offset, (const char *)data + offset, size - offset); data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/prediction.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest->elements, src->elements, sizeof(double) * src->rows * src->columns); data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/vectorimpl.h:95:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vector->values + vector->values_num, values, values_num * sizeof(__type)); \ data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:133:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[8]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:144:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&data, buf, sizeof(buf)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:168:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[8]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:199:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[4]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:206:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&data, buf, sizeof(buf)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:226:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[4]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:91:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ZABBIX_SERVICE_NAME[ZBX_SERVICE_NAME_LEN] = APPLICATION_NAME; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:92:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ZABBIX_EVENT_SOURCE[ZBX_SERVICE_NAME_LEN] = APPLICATION_NAME; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:480:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char month[12] = { 31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 }; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:673:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2660:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (value == atoi(start)) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2940:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(value, (unsigned char *)&value_uint64 + *((unsigned char *)&value_offset), size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:3004:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(value, (unsigned char *)&value_uint64 + *((unsigned char *)&value_offset), size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:3033:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[16]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:47:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ps_buf[PS_BUF_SIZE], *p_msg = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:346:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*str + *offset, src, n); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:710:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1175:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[32]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1196:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[11]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1210:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[9]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1689:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1777:14: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). wide_size = MultiByteToWideChar(codepage, 0, cp_string, -1, NULL, 0); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1781:2: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(codepage, 0, cp_string, -1, wide_string, wide_size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1801:11: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). if (0 == MultiByteToWideChar(CP_ACP, 0, acp_string, -1, wide_string, wide_size)) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1856:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t wide_string_static[STATIC_SIZE], *wide_string = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1890:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(utf8_string, in, in_size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1946:15: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). wide_size = MultiByteToWideChar(codepage, 0, in, (int)in_size, NULL, 0); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1954:3: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(codepage, 0, in, (int)in_size, wide_string, wide_size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1999:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, in, in_size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2536:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_dst, p_src, maxline); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2540:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_dst, delim, delim_size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2547:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_dst, p_src, left); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2668:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(*data)[l], value, sz_value); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2903:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*name, macro, len - 1); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:3169:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, param, len); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:4645:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, src + loc->l, len); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5496:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*data + offset, from, sz_from); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5534:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*left, src, left_size - 1); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5536:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*right, delimiter_ptr + 1, right_size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5678:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return ZBX_COMPONENT_VERSION(atoi(value), atoi(pminor)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5678:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return ZBX_COMPONENT_VERSION(atoi(value), atoi(pminor)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5715:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, text, len); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:30:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(value_bin, bin, size + sizeof(size)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:40:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(value_bin, &size, sizeof(size)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:41:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char *)value_bin + sizeof(size), data, size); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:50:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&size, bin, sizeof(zbx_uint32_t)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *value_str, buffer[ZBX_MAX_DOUBLE_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:291:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static ZBX_THREAD_LOCAL char buffer[ZBX_MAX_DOUBLE_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant_misc.c:51:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ZBX_MAX_DOUBLE_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/xml.c:22:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char data_static[ZBX_MAX_B64_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:241:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char empty_string[1]; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:47:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern ZBX_THREAD_LOCAL char info_buf[256]; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:66:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char zbx_socket_strerror_message[ZBX_SOCKET_STRERROR_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:111:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s->peer_info, &sa, (size_t)sz); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:531:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char service[8], *error = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:842:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header_buf[ZBX_TLS_MAX_REC_LEN]; /* Buffer is allocated on stack with a hope that it */ data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:859:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header_buf, ZBX_TCP_HEADER_DATA, ZBX_CONST_STRLEN(ZBX_TCP_HEADER_DATA)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:865:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header_buf + offset, &len32_le, sizeof(len32_le)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:869:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header_buf + offset, &len32_le, sizeof(len32_le)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:873:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header_buf + offset, data, take_bytes); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1002:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port[8], *ip, *ips, *delim; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1548:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ZBX_STAT_BUF_LEN], *ptr = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1747:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->buffer + buf_dyn_bytes, s->buf_stat, nbytes); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1800:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&expected_len, s->buf_stat + offset, sizeof(zbx_uint32_t)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1804:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&reserved, s->buf_stat + offset, sizeof(zbx_uint32_t)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1840:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->buffer, s->buf_stat + offset, buf_dyn_bytes); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1987:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->buffer + buf_dyn_bytes, s->buf_stat, nbytes); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2000:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->buffer, s->buf_stat, sizeof(s->buf_stat)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2023:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char netmask[16] = {0}; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2047:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if ((((const unsigned char *)address1)[i] & netmask[i]) != data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2048:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (((const unsigned char *)address2)[i] & netmask[i])) data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2062:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char ipv4_compat_mask[12] = {0}; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2064:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char ipv4_mapped_mask[12] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255}; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2097:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ipv6_compat_address[16], ipv6_mapped_address[16]; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2113:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ipv6_compat_address, ipv4_compat_mask, sizeof(ipv4_compat_mask)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2114:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ipv6_compat_address[sizeof(ipv4_compat_mask)], &name4->sin_addr.s_addr, 4); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2116:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ipv6_mapped_address, ipv4_mapped_mask, sizeof(ipv4_mapped_mask)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2117:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ipv6_mapped_address[sizeof(ipv4_mapped_mask)], &name4->sin_addr.s_addr, 4); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[65508]; /* maximum payload for UDP over IPv4 is 65507 bytes */ data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2371:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->buffer, buffer, read_bytes + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BUFFER_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:337:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BUFFER_LEN], c; data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:412:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BUFFER_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxcommshigh/comms.c:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[16]; data/zabbix-5.0.5+dfsg/src/libs/zbxcompress/compress.c:40:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char message[ZBX_COMPRESS_STRERROR_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:381:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN + 3], *parameter, *value; data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:403:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (file = fopen(cfg_file, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:472:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. *((char **)cfg[i].variable) = data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:473:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zbx_strdup(*((char **)cfg[i].variable), value); data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:476:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zbx_strarr_add((char ***)cfg[i].variable, value); data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:526:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if (NULL == (*(char **)cfg[i].variable)) data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/base64.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char from[4]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/base64.c:234:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char to[4]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/md5.c:170:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xbuf, data, 64); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/md5.c:344:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pms->buf + offset, p, copy); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/md5.c:358:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pms->buf, p, left); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:208:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static ZBX_THREAD_LOCAL char incoming_connection_psk_id[PSK_MAX_IDENTITY_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:211:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ZBX_THREAD_LOCAL char info_buf[256]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[1024]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:247:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[1024]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:327:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[1024]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1068:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tls_psk_hex[HOST_TLS_PSK_LEN_MAX], psk_buf[HOST_TLS_PSK_LEN / 2]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1145:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key->data, psk, psk_len); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1205:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psk, psk_for_cb, psk_len_for_cb); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1238:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tls_psk_hex[HOST_TLS_PSK_LEN_MAX], psk_buf[HOST_TLS_PSK_LEN / 2]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1316:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psk, psk_loc, psk_len); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1368:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[HOST_TLS_PSK_LEN_MAX + 2]; /* up to 512 bytes of hex-digits, maybe 1-2 bytes for '\n', */ data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1370:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_bin[HOST_TLS_PSK_LEN / 2]; /* up to 256 bytes of binary PSK */ data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1372:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(CONFIG_TLS_PSK_FILE, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1414:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(my_psk, buf_bin, my_psk_len); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1674:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oid_str[128]; /* size equal to MAX_OID_SIZE, internally defined in GnuTLS */ data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1691:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ava_dyn, ava_stat, ZBX_AVA_BUF_SIZE * sizeof(gnutls_x509_ava_st)); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1742:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(oid_str, ava->oid.data, ava->oid.size); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1949:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char issuer[HOST_TLS_ISSUER_LEN_MAX], subject[HOST_TLS_SUBJECT_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:2062:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tls_issuer[HOST_TLS_ISSUER_LEN_MAX], tls_subject[HOST_TLS_SUBJECT_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:3382:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char psk_buf[HOST_TLS_PSK_LEN / 2]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:3562:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psk_buf[HOST_TLS_PSK_LEN / 2]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_tcp_active.h:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char issuer[HOST_TLS_ISSUER_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_tcp_active.h:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subject[HOST_TLS_SUBJECT_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:172:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char errbuf[512]; data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:381:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *keywords[ZBX_DB_MAX_PARAMS + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:382:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *values[ZBX_DB_MAX_PARAMS + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:782:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ZBX_PG_BYTEAOID = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1510:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ret = atoi(PQcmdTuples(result)); data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1927:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char errbuf[512]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char table_name[ZBX_TABLENAME_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:621:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:760:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&trends[num++], &trends[i], sizeof(ZBX_DC_TREND)); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:784:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(*trends)[*trends_num], trend, sizeof(ZBX_DC_TREND)); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:937:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trends_tmp, trends, trends_num * sizeof(ZBX_DC_TREND)); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:1621:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_BUFFER_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:1865:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ZBX_MAX_DOUBLE_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:2165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64], *pvalue; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:2233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64], *pvalue; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3391:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&string_values[string_values_offset], value_orig, item_value->value.value_str.len); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3445:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&string_values[string_values_offset], log->value, item_value->value.value_str.len); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3452:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&string_values[string_values_offset], log->source, item_value->source.len); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3479:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&string_values[string_values_offset], error, item_value->value.value_str.len); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3497:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&string_values[string_values_offset], value_orig, item_value->value.value_str.len); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3785:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, &string_values[str->pvalue], str->len - 1); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:117:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, source, len); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:901:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *row[ARRSIZE(selected_fields)]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:963:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). config->config->default_inventory_mode = atoi(row[26]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:988:65: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_HK_OPTION_ENABLED == (config->config->hk.events_mode = atoi(row[9])) && data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:999:67: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_HK_OPTION_ENABLED == (config->config->hk.services_mode = atoi(row[14])) && data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1007:64: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_HK_OPTION_ENABLED == (config->config->hk.audit_mode = atoi(row[16])) && data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1015:67: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_HK_OPTION_ENABLED == (config->config->hk.sessions_mode = atoi(row[18])) && data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1023:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). config->config->hk.history_mode = atoi(row[20]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1024:68: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_HK_OPTION_ENABLED == (config->config->hk.history_global = atoi(row[21])) && data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1042:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). config->config->hk.trends_mode = atoi(row[23]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1043:67: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_HK_OPTION_ENABLED == (config->config->hk.trends_global = atoi(row[24])) && data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1410:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->maintenance_status = (unsigned char)atoi(row[7]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1411:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->maintenance_type = (unsigned char)atoi(row[8]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1412:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->maintenance_from = atoi(row[9]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1416:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->errors_from = atoi(row[10]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1417:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->available = (unsigned char)atoi(row[11]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1418:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->disable_until = atoi(row[12]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1419:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->snmp_errors_from = atoi(row[13]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1420:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->snmp_available = (unsigned char)atoi(row[14]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1421:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->snmp_disable_until = atoi(row[15]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1422:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->ipmi_errors_from = atoi(row[16]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1423:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->ipmi_available = (unsigned char)atoi(row[17]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1424:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->ipmi_disable_until = atoi(row[18]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1425:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->jmx_errors_from = atoi(row[19]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1426:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->jmx_available = (unsigned char)atoi(row[20]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1427:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->jmx_disable_until = atoi(row[21]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1479:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ipmi_authtype = (signed char)atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1480:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ipmi_privilege = (unsigned char)atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1512:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). proxy->lastaccess = atoi(row[24]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1520:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). proxy->auto_compress = atoi(row[32 + ZBX_HOST_TLS_OFFSET]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2618:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). item->flags = (unsigned char)atoi(row[18]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2646:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). item->state = (unsigned char)atoi(row[12]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2648:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). item->mtime = atoi(row[21]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2836:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sshitem->authtype = (unsigned short)atoi(row[13]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2963:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->follow_redirects = (unsigned char)atoi(row[35]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2964:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->post_type = (unsigned char)atoi(row[36]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2967:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->retrieve_mode = (unsigned char)atoi(row[39]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2968:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->request_method = (unsigned char)atoi(row[40]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2969:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->output_format = (unsigned char)atoi(row[41]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2973:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->verify_peer = (unsigned char)atoi(row[45]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2974:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->verify_host = (unsigned char)atoi(row[46]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2975:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->allow_traps = (unsigned char)atoi(row[47]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2977:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpitem->authtype = (unsigned char)atoi(row[13]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:3388:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). trigger->lastchange = atoi(row[8]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:3897:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). action->opflags = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:4754:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). op->step = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:4755:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). op->error_handler = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6569:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char autoreg_psk_tmp[HOST_TLS_PSK_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6988:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst_function->function, src_function->function, sz_function); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6989:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst_function->parameter, src_function->parameter, sz_parameter); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:12775:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *exp, *tmp,*expanded, error[128]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h:358:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *values[HOST_INVENTORY_FIELD_COUNT]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h:520:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *severity_name[TRIGGER_SEVERITY_COUNT]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h:831:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char autoreg_psk_identity[HOST_TLS_PSK_IDENTITY_LEN_MAX]; /* autoregistration PSK */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h:832:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char autoreg_psk[HOST_TLS_PSK_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:105:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maintenance->active_since = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:106:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maintenance->active_until = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:301:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period->every = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:302:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period->month = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:303:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period->dayofweek = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:304:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period->day = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:305:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period->start_time = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:306:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period->period = atoi(row[7]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:307:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period->start_date = atoi(row[8]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:110:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return (atoi(value_raw) == value ? SUCCEED : FAIL); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:258:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sync->row, row, sizeof(char *) * sync->columns_num); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:620:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ipmi_authtype = (signed char)atoi(dbrow[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:621:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ipmi_privilege = (unsigned char)atoi(dbrow[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:894:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostid_s[MAX_ID_LEN + 1], templateid_s[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:895:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *del_row[2] = {hostid_s, templateid_s}; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:2242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char down_s[MAX_ID_LEN + 1], up_s[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:2243:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *del_row[2] = {down_s, up_s}; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:2675:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char actionid_s[MAX_ID_LEN], opflags_s[MAX_ID_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:2733:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch (atoi(dbrow[1])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:3997:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char maintenanceid_s[MAX_ID_LEN + 1], groupid_s[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:3998:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *del_row[2] = {maintenanceid_s, groupid_s}; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:4074:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char maintenanceid_s[MAX_ID_LEN + 1], hostid_s[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:4075:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *del_row[2] = {maintenanceid_s, hostid_s}; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:4151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char groupid_s[MAX_ID_LEN + 1], hostid_s[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:4152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *del_row[2] = {groupid_s, hostid_s}; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.c:1645:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&item->tail->slots[item->tail->first_value - values_num], values, data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:557:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). count = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:581:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *lastaccess = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1238:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf_string[640]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1335:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). user_type = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1453:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[22]; /* 1 - '=', 20 - value size, 1 - '\0' */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1454:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char is_null[9] = " is null"; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1615:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). autoreg_host->flag != atoi(row[7])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2009:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[4][21]; /* 20 - value size, 1 - '\0' */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2010:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char null[5] = "null"; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2037:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *inventory_fields[HOST_INVENTORY_FIELD_COUNT] = data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2440:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *database_name_esc, *schema_name_esc, oid[OID_LENGTH_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2875:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sql_command, delim[2] = {',', '('}; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:3363:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *field_prefix[ZBX_AGENT_MAX] = {"", "snmp_", "ipmi_", "jmx_"}; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:3451:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). user->type = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:185:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dhost->status = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:186:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dhost->lastup = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:187:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dhost->lastdown = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:253:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dservice->status = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:254:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dservice->lastup = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:255:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dservice->lastdown = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:70:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event->source = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:71:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event->object = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:73:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event->clock = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:74:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event->value = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:75:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event->acknowledged = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:76:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event->ns = atoi(row[7]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:78:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event->severity = atoi(row[9]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:83:30: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (history_file = fopen(history_file_name, "a"))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:92:29: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (trends_file = fopen(trends_file_name, "a"))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:104:31: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (problems_file = fopen(problems_file_name, "a"))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_str[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:122:41: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == *file && (NULL == (*file = fopen(name, "a")))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:138:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename_old[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:166:24: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (*file = fopen(name, "a"))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_ID_LEN + 3], replace[MAX_ID_LEN + 3], *old_expr = NULL, *expr = NULL, *rexpr = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:638:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gitem->drawtype = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:639:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gitem->sortorder = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:641:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gitem->yaxisside = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:642:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gitem->calc_fnc = atoi(row[7]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:643:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gitem->type = atoi(row[8]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:644:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gitem->flags = (unsigned char)atoi(row[9]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:750:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). t_flags = (unsigned char)atoi(trow[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:782:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). h_flags = (unsigned char)atoi(hrow[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:858:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = (unsigned char)atoi(trow[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:878:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = (unsigned char)atoi(trow[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3043:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (0 == atoi(row[0])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3097:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host_prototype->status = (unsigned char)atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3099:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host_prototype->discover = (unsigned char)atoi(row[5]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3143:61: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (host_prototype->status != (status = (unsigned char)atoi(row[4]))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3145:53: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (host_prototype->discover != (unsigned char)atoi(row[5])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3980:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[10]), /* recovery_mode */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3981:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[3]), /* status */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3982:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[4]), /* type */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3983:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[5]), /* priority */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3986:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[8]), /* flags */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3987:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[11]), /* correlation_mode */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3989:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[13]), /* manual_close */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3991:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[15])); /* discover */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4316:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). atoi(row[2]), /* width */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4317:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). atoi(row[3]), /* height */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4320:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[6]), /* show_work_period */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4321:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[7]), /* show_triggers */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4322:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[8]), /* graphtype */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4323:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[9]), /* show_legend */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4324:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[10]), /* show_3d */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4327:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[13]), /* ymin_type */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4328:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[14]), /* ymax_type */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4331:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[17]), /* flags */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4332:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[18])); /* discover */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4463:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httptest->status = (unsigned char)atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4465:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httptest->authentication = (unsigned char)atoi(row[6]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4469:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httptest->retries = atoi(row[10]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4513:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpfield->type = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4556:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpstep->no = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4562:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpstep->follow_redirects = atoi(row[9]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4563:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpstep->retrieve_mode = atoi(row[10]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4564:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpstep->post_type = atoi(row[11]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4627:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpfield->type = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4704:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httptestitem->type = (unsigned char)atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4766:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httpstepitem->type = (unsigned char)atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *template_names, err[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5423:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). db_useip = (unsigned char)atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5426:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). db_main = (unsigned char)atoi(row[5]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5719:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). internal = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5910:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else if (inventory_mode != atoi(row[0])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:280:63: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itservice = its_itservice_create(itservices, serviceid, 0, atoi(row[1]), atoi(row[2])); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:280:77: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itservice = its_itservice_create(itservices, serviceid, 0, atoi(row[1]), atoi(row[2])); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:347:59: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parent = its_itservice_create(itservices, parentid, 0, atoi(row[1]), atoi(row[2])); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:347:73: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parent = its_itservice_create(itservices, parentid, 0, atoi(row[1]), atoi(row[2])); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:405:70: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itservice = its_itservice_create(itservices, serviceid, triggerid, atoi(row[2]), atoi(row[3])); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:405:84: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itservice = its_itservice_create(itservices, serviceid, triggerid, atoi(row[2]), atoi(row[3])); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[INTERFACE_IP_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:127:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *availability_tag_available[ZBX_AGENT_MAX] = {ZBX_PROTO_TAG_AVAILABLE, data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:130:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *availability_tag_error[ZBX_AGENT_MAX] = {ZBX_PROTO_TAG_ERROR, data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:338:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ch_error, host[HOST_HOST_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:572:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (SUCCEED == is_item_processed_by_server(atoi(row[fld_type]), row[fld_key])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:1601:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value->i32 = atoi(buf); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:1850:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ZBX_TABLENAME_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2058:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ha->agents[i].available = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2243:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ts = (int)time(NULL) - atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2264:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sql[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2452:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hd->clock = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2453:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hd->ns = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2463:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hd->timestamp = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2464:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hd->severity = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2465:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hd->logeventid = atoi(row[8]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2479:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*string_buffer + hd->source_offset, row[5], len1); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2483:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*string_buffer + hd->value_offset, row[7], len2); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2490:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hd->mtime = atoi(row[11]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3059:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3068:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3073:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ns = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3154:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). av->state = (unsigned char)atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3167:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). av->mtime = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3175:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). av->timestamp = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3181:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). av->severity = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3184:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). av->logeventid = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3597:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3766:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3985:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). service->itemtime = (time_t)atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3986:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). service->port = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3988:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). service->status = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4090:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[INTERFACE_IP_LEN_MAX], data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4113:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itemtime = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4161:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[HOST_HOST_LEN_MAX], ip[INTERFACE_IP_LEN_MAX], dns[INTERFACE_DNS_LEN_MAX], data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4298:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itemtime = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4319:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). flags_int = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4431:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). count = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4454:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4619:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). proxy_diff.more_data = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4627:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). proxy_diff.proxy_delay = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:474:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcid[64], dstid[64], *ptr; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1314:73: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zbx_db_insert_add_values(&db_insert, __UINT64_C(0), (*pitem)->itemid, atoi(row[1]), atoi(row[2]), data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1314:87: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zbx_db_insert_add_values(&db_insert, __UINT64_C(0), (*pitem)->itemid, atoi(row[1]), atoi(row[2]), data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1315:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). row[3], atoi(row[4]), row[5]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1547:55: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->operationtype = (unsigned char)atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1548:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->operator = (unsigned char)atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1551:76: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->status = FAIL == DBis_null(row[5]) ? (unsigned char)atoi(row[5]) : data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1554:78: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->discover = FAIL == DBis_null(row[6]) ? (unsigned char)atoi(row[6]) : data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1566:78: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->severity = FAIL == DBis_null(row[10]) ? (unsigned char)atoi(row[10]) : data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1588:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[14]) : HOST_INVENTORY_COUNT; data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c:749:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sql[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c:818:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *mandatory = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c:819:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *optional = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c:1035:59: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (NULL != (row = DBfetch(result)) && total_dbl_cols == atoi(row[0])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:521:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (SEC_PER_WEEK < (ts = (time_t)atoi(row[1]))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2030.c:504:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). local_nodeid = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2030.c:686:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). local_nodeid = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:287:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). object_events_local.source = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:288:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). object_events_local.object = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:292:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:407:61: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (NULL == (row = DBfetch(result)) || 0 == (actions_num = atoi(row[0]))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:480:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). conditiontype = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:489:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:521:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:559:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (1 != atoi(row[1]) || 0 != atoi(row[3]) || (0 == atoi(row[0]) && 0 != recovery_msg)) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:559:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (1 != atoi(row[1]) || 0 != atoi(row[3]) || (0 == atoi(row[0]) && 0 != recovery_msg)) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:559:56: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (1 != atoi(row[1]) || 0 != atoi(row[3]) || (0 == atoi(row[0]) && 0 != recovery_msg)) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:590:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eventsource = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:591:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). evaltype = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:592:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). recovery_msg = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:727:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:1062:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eventsource = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:1063:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). evaltype = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:1125:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (0 == atoi(row[3]) && 0 != atoi(row[2])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:1125:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (0 == atoi(row[3]) && 0 != atoi(row[2])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:241:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). formula = (1 == atoi(row[3]) ? row[4] : NULL); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:1074:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi(row[i]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:1255:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). delay = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:1265:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). delay = atoi(delay_flex); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:1381:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3050.c:1259:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). action = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3050.c:1313:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, src_len); /* parameter body */ data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4030.c:281:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). id = atoi(pos + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4030.c:404:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (100 == atoi(row[1])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4030.c:407:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). 0 == atoi(row[4]) ? 160 : 136); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:266:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). col = 2 + (atoi(row[1]) * 2); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:290:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *messages[3][3][4] = data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:429:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch (atoi(row[1])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:435:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). content_type = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:1538:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (0 == (value_int = atoi(row[2]))) data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:58:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ZBX_DIAG_FIELD_MAX + 1], value[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:171:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ID_LEN + 2]; data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:482:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_ID_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:500:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *names[ZBX_MUTEX_COUNT] = {"ZBX_MUTEX_LOG", "ZBX_MUTEX_CACHE", "ZBX_MUTEX_TRENDS", data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:537:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section[ZBX_DIAG_SECTION_MAX + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:640:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_STRING_LEN], *value = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:897:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char section[ZBX_DIAG_SECTION_MAX + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2171:26: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define DUK_MEMCPY memcpy data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:9401:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DUK_INTERNAL_DECL char duk_debug_file_stash[DUK_DEBUG_STASH_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:9403:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DUK_INTERNAL_DECL char duk_debug_func_stash[DUK_DEBUG_STASH_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:10728:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[DUK__DEBUG_BUFSIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:10747:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DUK_INTERNAL char duk_debug_file_stash[DUK_DEBUG_STASH_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:10749:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DUK_INTERNAL char duk_debug_func_stash[DUK_DEBUG_STASH_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:10759:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[DUK__DEBUG_BUFSIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:11656:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[DUK__ERRFMT_BUFSIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:17664:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DUK_LOCAL const char * const duk__symbol_type_strings[4] = { data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:20319:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DUK_LOCAL const char * const duk__toprim_hint_strings[3] = { data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:25863:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:30696:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char yearstr[8]; /* "-123456\0" */ data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:30697:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tzstr[8]; /* "+11:22\0" */ data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:30746:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (const char *) yearstr, (int) parts[DUK_DATE_IDX_MONTH], (int) parts[DUK_DATE_IDX_DAY], (int) sep, data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:30751:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (const char *) yearstr, (int) parts[DUK_DATE_IDX_MONTH], (int) parts[DUK_DATE_IDX_DAY]); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:31756:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[DUK__STRPTIME_BUF_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:31816:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[DUK__STRFTIME_BUF_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:35962:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; /* XXX: how to figure correct size? */ data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:37094:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:37418:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char spaces[10] = { data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:41931:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64+1]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:42019:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. DUK_LOCAL const char * const duk__bc_optab[256] = { data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:42757:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. duk_fb_sprintf(fb, "%s", (const char *) duk__bc_optab[opcode]); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:42899:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmtbuf[DUK__MAX_FORMAT_TAG_LENGTH]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:46542:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[DUK_USE_FATAL_MAXLEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:46556:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[DUK_USE_FATAL_MAXLEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:84838:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[DUK__BI_MAX_PARTS * 9 + 64]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:89979:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((unsigned char *) ptr)[j] = (unsigned char) (0x80 + j); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:89989:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. x = ((unsigned char *) ptr)[j]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.h:260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[128]; data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:371:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, ZBX_ES_SCRIPT_HEADER, ZBX_CONST_STRLEN(ZBX_ES_SCRIPT_HEADER)); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:373:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, script, len); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:375:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, ZBX_ES_SCRIPT_FOOTER, ZBX_CONST_STRLEN(ZBX_ES_SCRIPT_FOOTER)); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:395:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*code, buffer, sz); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:464:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, code, size); data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_buf[PIPE_BUFFER_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:454:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_buf[PIPE_BUFFER_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history.c:163:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[CURL_ERROR_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:121:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[ZBX_MAX_DOUBLE_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:150:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hr->timestamp.sec = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:155:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hr->timestamp.ns = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:168:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hr->value.log->timestamp = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:173:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hr->value.log->logeventid = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:178:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). hr->value.log->severity = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char http_status[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:514:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char http_status[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:887:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pipeline[14]; /* index name length + suffix "-pipeline" */ data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:75:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value->log->timestamp = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:76:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value->log->logeventid = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:77:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value->log->severity = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:395:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value.timestamp.sec = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:396:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value.timestamp.ns = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:474:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value.timestamp.sec = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:475:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value.timestamp.ns = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:571:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value.timestamp.sec = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:572:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value.timestamp.ns = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/http.c:140:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char auth[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:127:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], err[255]; data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:161:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *value = atoi(p); data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:177:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *value = atoi(p); data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:243:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], error[255], *out = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char params[70]; data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char params6[70]; data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:515:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(filename, "w"))) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:608:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). index = atoi(c + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:18:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ipc_path[ZBX_IPC_PATH_MAX] = {0}; data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:155:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ipc_path + offset , ZBX_IPC_SOCKET_PREFIX, ZBX_CONST_STRLEN(ZBX_IPC_SOCKET_PREFIX)); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:157:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ipc_path + offset, prefix, prefix_len); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:159:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ipc_path + offset, service_name, path_len); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:161:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ipc_path + offset, ZBX_IPC_SOCKET_SUFFIX, ZBX_CONST_STRLEN(ZBX_IPC_SOCKET_SUFFIX) + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:333:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + 2, data, size); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:379:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)header + rx_bytes, buffer, copy_size); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:403:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*data + data_offset, buffer + *read_size, copy_size); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1031:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(message->data, data, size); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1425:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->data, src->data, src->size); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1485:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ipc_path, path, ipc_path_root_len + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1753:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(client->tx_data, data, size); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:39:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static ZBX_THREAD_LOCAL char zbx_json_strerror_message[ZBX_JSON_MAX_STRERROR]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:98:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(j->buffer, j->buf_stat, sizeof(j->buf_stat)); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:426:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, data, len_data); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:436:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_ID_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:444:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_ID_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_ID_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:881:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char uc[4]; /* decoded Unicode character takes 1-4 bytes in UTF-8 */ data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:929:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, p, len); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:1043:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:1266:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&index, segment->data.list.values->data, sizeof(int)); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:148:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, source, len); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1051:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi(start); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1052:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node->data, &value, sizeof(int)); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1110:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&segment->data.range.end, node->data, sizeof(int)); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1117:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&segment->data.range.start, node->data, sizeof(int)); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1920:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:2068:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:2148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:2237:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.h:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[1]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:32:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char log_filename[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:113:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(filename, open_flags, 0666))) data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:129:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(default_file, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:159:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename_old[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:171:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (log_file = fopen(filename, "w"))) data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:311:27: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (log_file = fopen(filename, "a+"))) data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAX_BUFFER_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:364:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t thread_id[20], *strings[2]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:380:27: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (log_file = fopen(log_filename, "a+"))) data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:600:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char utf8_string[ZBX_MESSAGE_BUF_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:611:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t wide_string[ZBX_MESSAGE_BUF_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:613:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char utf8_string[ZBX_MESSAGE_BUF_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:643:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t wide_string[ZBX_MESSAGE_BUF_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:646:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char utf8_string[ZBX_MESSAGE_BUF_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:85:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b64_buf[ZBX_EMAIL_B64_MAXWORD_RFC2047 - 12 + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:245:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mailaddr->disp_name, pstart, (size_t)(angle_addr_start - pstart)); data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:280:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_time[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:388:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, payload_status->payload + payload_status->provided_len, current_len); data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:397:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char labels[3] = {'*', '<', '>'}; data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:421:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_STRING_LEN], *cmdp = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:617:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char url[MAX_STRING_LEN], errbuf[CURL_ERROR_SIZE] = ""; data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rcv[0xff]; data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:102:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[0xff], *ebuf = buffer, *sbuf = buffer; data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:240:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (f = open(device, O_RDWR | O_NOCTTY | O_NDELAY))) data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:421:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)new_chunk + MEM_SIZE_FIELD, (char *)chunk + MEM_SIZE_FIELD, chunk_size); data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:446:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, (char *)chunk + MEM_SIZE_FIELD, chunk_size); data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:456:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)new_chunk + MEM_SIZE_FIELD, tmp, chunk_size); data/zabbix-5.0.5+dfsg/src/libs/zbxmodules/modules.c:231:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char full_name[MAX_STRING_LEN], error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxnix/daemon.c:414:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[256]; data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.c:340:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (fd = fopen("/proc/self/maps", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.c:342:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1024]; data/zabbix-5.0.5+dfsg/src/libs/zbxnix/pid.c:40:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 != (fd = open(pidfile, O_WRONLY | O_APPEND))) data/zabbix-5.0.5+dfsg/src/libs/zbxnix/pid.c:54:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (fpid = fopen(pidfile, "w"))) data/zabbix-5.0.5+dfsg/src/libs/zbxnix/pid.c:79:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f_pid = fopen(pidfile, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:132:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, src + loc->l, len); data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:545:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4]; data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:912:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[5]; data/zabbix-5.0.5+dfsg/src/libs/zbxregexp/zbxregexp.c:251:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(matches, ovector, (size_t)((0 < r) ? MIN(r, count) : count) * sizeof(zbx_regmatch_t)); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:246:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logeventid[16]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3037:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3075:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kmgt[8]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3076:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3153:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = (time_t)atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:661:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). user_type = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:774:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). user_type = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[4]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1158:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sql[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1460:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value_type = (unsigned char)atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1465:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_BUFFER_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1619:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). now = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1620:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = (unsigned char)atoi(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1621:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = (unsigned char)atoi(row[2]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1622:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). esc_step = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1725:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ack.clock = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1729:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ack.action = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1730:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ack.old_severity = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1731:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ack.new_severity = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:2778:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + 1, *replace_to, replace_to_len); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3584:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zbx_dobject_status2str(atoi(replace_to))); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3595:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zbx_age2str(time(NULL) - atoi(replace_to))); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3608:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zbx_dservice_type_string(atoi(replace_to))); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3621:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zbx_dobject_status2str(atoi(replace_to))); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3632:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). zbx_age2str(time(NULL) - atoi(replace_to))); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5167:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5369:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:6148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRING_LEN], value[MAX_STRING_LEN], *p_name = NULL, *p_value = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:6369:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*data, (const char *)mem, size + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/proc.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procargs[MAX_BUFFER_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:39:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static ZBX_THREAD_LOCAL char buf[16]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:89:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ip, zone[MAX_STRING_LEN], buffer[MAX_STRING_LEN], *zone_str, *param, data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:197:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp2[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:207:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[PACKETSZ]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:209:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[1024]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:216:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[NS_PACKETSZ]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:218:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[PACKETSZ]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:220:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[512]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:491:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&saved_ns, &(_res.nsaddr_list[0]), sizeof(struct sockaddr_in)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:524:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(res_state_local._u._ext.ext, &sockaddrin6, sizeof(sockaddrin6)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:530:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&saved_ns, &(_res.nsaddr_list[0]), sizeof(struct sockaddr_in)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:548:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_res._u._ext.ext, &sockaddrin6, sizeof(sockaddrin6)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:551:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&_res._ext.ext.nsaddrs[0], &sockaddrin6, sizeof(sockaddrin6)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:601:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_res._u._ext.ext, &saved_ns6, sizeof(saved_ns6)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:603:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&_res._ext.ext.nsaddrs[0], &saved_ns6, sizeof(saved_ns6)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:607:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(_res.nsaddr_list[0]), &saved_ns, sizeof(struct sockaddr_in)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:661:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&inaddr, msg_ptr, INADDRSZ); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:677:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&in6addr, msg_ptr, IN6ADDRSZ); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:759:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&inaddr, msg_ptr, INADDRSZ); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:288:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *filename, *tmp, encoding[32]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:289:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char read_buf[MAX_BUFFER_LEN], *utf8, *contents = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:398:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *filename, *regexp, encoding[32], *output, *start_line_str, *end_line_str; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:399:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BUFFER_LEN], *utf8, *tmp, *ptr = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:519:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *filename, *regexp, *tmp, encoding[32]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:520:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BUFFER_LEN], *utf8, *start_line_str, *end_line_str; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/net.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ip_str, ip[MAX_ZBX_DNSNAME_LEN + 1], *port_str; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/system.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *type, buf[32]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/system.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char counter_path[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/zabbix_stats.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/diskio.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dev[DEVSTAT_NAME_LEN + 10]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/diskio.c:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devname[32], *tmp; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/net.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *port_str, command[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/net.c:214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *port_str, command[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c:32:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf_ctl[1024]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c:305:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mib, (Ext_mib_t *)(buf_ctl + stat_msg.dl_stat_offset), sizeof(Ext_mib_t)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c:385:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open("/dev/dlpi", O_RDWR))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/proc.c:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdline[1024]; /* up to 1020 characters from HP-UX */ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/boottime.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/boottime.c:33:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/stat", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:193:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:199:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/stat", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:234:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/stat", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], name[MAX_STRING_LEN], dev_path[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:96:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(INFO_FILE_NAME, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:142:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], name[MAX_STRING_LEN], dev_path[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:155:54: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (zbx_stat(dev_path, &dev_st) < 0 || NULL == (f = fopen(INFO_FILE_NAME, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *devname, *tmp, kernel_devname[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:303:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:337:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (f = fopen(tmp, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN], *p, *mpoint, *mtype; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:138:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/mounts", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN], *p, *mpoint, *mtype, *error; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:197:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/mounts", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:254:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/mounts", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:147:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 != (fd = open(SYS_TABLE_FILE, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:167:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if (-1 != (fd = open(DEV_MEM, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:227:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(smbuf, (char *)mmp + len, smbios_len); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:287:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mode, buf[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:328:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:333:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(filename, "r"); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:380:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN], name[MAX_STRING_LEN], tmp[MAX_STRING_LEN], buffer[MAX_BUFFER_LEN], *param; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:417:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(HW_CPU_INFO_FILE, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:436:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cur_cpu = atoi(tmp); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:514:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *format, *p, *regex, address[MAX_STRING_LEN], buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/kernel.c:26:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/kernel.c:29:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (f = fopen(path, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/memory.c:115:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/meminfo", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/memory.c:223:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/meminfo", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BUFSIZ] = { 0 }; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:212:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN], name[MAX_STRING_LEN], *p; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:221:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/net/dev", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:300:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(filename, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:383:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(filename, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:564:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN], *p; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:570:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/net/dev", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:607:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pattern[64], *port_str, *buffer = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:708:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pattern[64], *port_str, *buffer = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *p, *p1; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:166:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uid = (uid_t)atoi(p); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:204:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *p; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:261:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_STRING_LEN], *p_value, *p_unit; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:337:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (f = fopen("/proc/meminfo", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:363:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *procname, *proccomm, *param; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:531:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (0 == atoi(entries->d_name)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:536:24: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f_cmd = fopen(tmp, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:541:25: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f_stat = fopen(tmp, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:727:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *procname, *proccomm, *param; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:798:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (0 == atoi(entries->d_name)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:803:24: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f_cmd = fopen(tmp, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:808:25: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f_stat = fopen(tmp, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:853:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *pend, *pstart; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:857:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(tmp, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:898:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:905:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(tmp, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:961:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:1019:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *ptr; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:1023:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(tmp, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:38:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(filename, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_STRING_LEN], buf[ATTR_MAX], *p; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:103:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (f = fopen(path, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:275:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sensorname[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:287:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devicename[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:323:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hwmon_dir[MAX_STRING_LEN], devicepath[MAX_STRING_LEN], deviced[MAX_STRING_LEN], data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *type, line[MAX_STRING_LEN], tmp_line[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:65:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(SW_OS_FULL, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:74:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(SW_OS_SHORT, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:85:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (f = fopen(SW_OS_NAME_RELEASE, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:102:41: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (FAIL == line_read && NULL == (f = fopen(SW_OS_NAME, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[32], tmp[32]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_BUFFER_LEN], *regex, *manager, *mode, tmp[MAX_STRING_LEN], *buf = NULL, data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:123:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:133:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen(INFO_FILE_NAME, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:161:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (f = fopen("/proc/stat", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:163:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (f = fopen("/proc/vmstat", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:209:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_STRING_LEN], *s; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:221:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/proc/swaps", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/sensors.c:105:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char human[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c:92:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). proc = open(filename, O_RDONLY); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c:160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c:216:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). proc = open(filename, O_RDONLY); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/swap.c:34:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char path[256]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/net.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *port_str, command[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/net.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *port_str, command[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/ntp.c:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char request[NTP_PACKET_SIZE]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *attrs[2] = {"namingContexts", NULL }; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char send_buf[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char https_host[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *service, *ip_str, ip[MAX_ZBX_DNSNAME_LEN + 1], *port_str; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskspace.c:210:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/etc/mnttab", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskspace.c:254:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/etc/mnttab", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskspace.c:296:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (f = fopen("/etc/mnttab", "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/net.c:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *port_str, command[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/net.c:332:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *port_str, command[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:232:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:243:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(path, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:268:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL != (fp = fopen(path, "r"))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:406:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *procname, *proccomm, *param, *memtype = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:570:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *procname, *proccomm, *param, *zone_parameter; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:738:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:744:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(tmp, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:757:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(tmp, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:816:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/swap.c:41:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char path[256]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:915:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ZBX_MAX_DOUBLE_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1666:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*data + *data_offset, &agent_ret, sizeof(int)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1673:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*data + *data_offset, *pvalue, value_len); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1695:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&agent_ret, data, sizeof(int)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1780:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN], *data; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1854:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + data_offset, buffer, n); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:178:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t fs_name[MAX_PATH + 1], *long_path = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:196:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(long_path + 4, path, sz * sizeof(wchar_t)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/hostname.c:30:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t computerName[256]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/hostname.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *type, buffer[256]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/net.c:312:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[16]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/pdhmon.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char counterpath[PDH_MAX_COUNTER_PATH], *tmp, *error = NULL; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:37:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t name[MAX_NAME], dom[MAX_NAME]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *procName, *userName, baseName[MAX_PATH], uname[MAX_NAME]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *proc_name, *attr, *type, baseName[MAX_PATH]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/services.c:411:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t *wname, service_name[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/services.c:555:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t service_name[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:90:23: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). vi.dwMinorVersion = _wtoi(ptr); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:93:22: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). vi.dwMajorVersion = _wtoi(key_value); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:117:22: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). vi.dwBuildNumber = _wtoi(key_value); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:211:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch (atoi(proc_architecture)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:218:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (32 == atoi(proc_addresswidth)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/uptime.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char counter_path[64]; data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:255:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data->data, str, len); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:882:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:894:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). commandtype = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:899:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). execute_on = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:904:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:909:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). authtype = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:970:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:980:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1012:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1057:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1080:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1090:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1132:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clock = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1137:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl = atoi(value); data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1274:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (SUCCEED != (ret = atoi(row[0]))) data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/fatal.c:123:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t szProcessName[MAX_PATH]; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:32:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t eng_name[PDH_MAX_COUNTER_NAME]; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:61:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t eng_name[PDH_MAX_COUNTER_NAME]; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:555:26: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). counter_index = (DWORD)_wtoi(counter_text); data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:575:26: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). counter_index = (DWORD)_wtoi(counter_text); data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:711:42: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cpe->szObjectName = get_counter_name(_wtoi(cpe->szObjectName)); data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:713:43: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cpe->szCounterName = get_counter_name(_wtoi(cpe->szCounterName)); data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:182:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t path1[MAX_PATH], path2[MAX_PATH]; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:207:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t execName[MAX_PATH]; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:208:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t regkey[256], *wevent_source; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:237:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t cmdLine[MAX_PATH]; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:285:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t regkey[256]; data/zabbix-5.0.5+dfsg/src/modules/dummy/dummy.c:158:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). from = atoi(param1); data/zabbix-5.0.5+dfsg/src/modules/dummy/dummy.c:159:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). to = atoi(param2); data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:370:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). delay = atoi(tmp); data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:386:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). mtime = atoi(tmp); data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:464:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). expression_type = atoi(tmp); data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:481:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). case_sensitive = atoi(tmp); data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:711:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:712:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:129:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t cpu[16]; /* 16 is enough to store instance name string (group and index) */ data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char counterPath[PDH_MAX_COUNTER_PATH]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:379:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1024]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:422:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (file = fopen(filename, "r"))) data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:441:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idx = atoi(line + 3) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.h:46:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char h_status[MAX_COLLECTOR_HISTORY]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.h:48:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char padding0[8 - (MAX_COLLECTOR_HISTORY % 8)]; /* for 8-byte alignment */ data/zabbix-5.0.5+dfsg/src/zabbix_agent/diskdevices.c:129:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(diskdevices->device + i, diskdevices->device + i + 1, data/zabbix-5.0.5+dfsg/src/zabbix_agent/diskdevices.h:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:118:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t reg_path[MAX_PATH]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:188:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t buf[MAX_PATH]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:320:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dwMessageId = atoi(pend); data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:786:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *evt_provider, *evt_source, *evt_message, str_logeventid[8]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:1438:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *value, str_logeventid[8]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:1669:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else if (MIN_VALUE_LINES > (rate = atoi(maxlines_persec)) || MAX_VALUE_LINES < rate) data/zabbix-5.0.5+dfsg/src/zabbix_agent/listener.c:120:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s, (zbx_socket_t *)((zbx_thread_args_t *)args)->args, sizeof(zbx_socket_t)); data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:255:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LEN_MD5]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:393:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t *path_uni, mount_point[MAX_PATH + 1], fs_type[MAX_PATH + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2266:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp, p1, sizeof(struct st_logfile)); data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2267:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p1, p2, sizeof(struct st_logfile)); data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2268:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p2, &tmp, sizeof(struct st_logfile)); data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2578:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32 * ZBX_KIBIBYTE]; /* buffer must be of size multiple of 4 as some character */ data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:3306:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (MIN_VALUE_LINES > (rate = atoi(p)) || data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:3567:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ZBX_MAX_UINT64_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:291:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(object_names[object_num].loc_name, object, sizeof(wchar_t) * sz); data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:303:17: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idx = (DWORD)_wtoi(loc_name); data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:315:21: [2] (integer) _wtoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idx_eng = (DWORD)_wtoi(eng_name); data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:878:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(loc_name, object_names[i].loc_name, sz); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:339:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(PROCSTAT_PTR(base, offset), str, len); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:403:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(qdst, qsrc, sizeof(zbx_procstat_query_t)); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:753:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pids->values + pids->values_num, qdata->pids.values, data/zabbix-5.0.5+dfsg/src/zabbix_agent/stats.c:107:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL == (file = fopen("/proc/cpuinfo", "r"))) data/zabbix-5.0.5+dfsg/src/zabbix_agent/stats.c:389:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_diskdevices, diskdevices, old_shm_size); data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, **pline, error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.c:160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRING_LEN], counterpath[PDH_MAX_COUNTER_PATH], interval[8]; data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.c:206:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period = atoi(interval); data/zabbix-5.0.5+dfsg/src/zabbix_get/zabbix_get.c:360:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = (unsigned short)atoi(zbx_optarg); data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4096]; data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:121:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (fd = open(filename, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:219:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). loglevel = atoi(zbx_optarg); data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:222:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). timeout = atoi(zbx_optarg); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/housekeeper/housekeeper.c:96:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). minclock = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/housekeeper/housekeeper.c:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sleeptext[25]; data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxyconfig/proxyconfig.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[16], *error = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:69:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:69:70: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:69:84: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:82:69: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task->data = zbx_tm_remote_command_result_create(parent_taskid, atoi(row[4]), row[6]); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:93:59: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task->data = zbx_tm_data_result_create(parent_taskid, atoi(row[7]), row[9]); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c:102:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). script.port = (0 == atoi(row[2]) ? (char *)"" : row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c:286:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch (data_type = atoi(row[2])) data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c:350:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clock = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c:351:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_sender/win32/zabbix_sender.c:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:571:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1321:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_BUFFER_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1337:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*buffer + buffer_offset, tmp, len); data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1454:26: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if (NULL == (in = fopen(INPUT_FILE, "r"))) data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1468:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[MAX_STRING_LEN], clock[32]; data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:652:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). condition_value = (unsigned char)atoi(condition->value); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:794:4: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). atoi(condition->value)); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1290:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int i, condition_value_i = atoi(condition->value); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1621:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). condition_value_i = atoi(condition->value); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1653:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmp_int = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1692:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int i, condition_value_i = atoi(condition->value); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1743:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). condition_value_i = atoi(condition->value); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1788:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmp_int = DOBJECT_STATUS_UP == atoi(row[1]) ? atoi(row[2]) : atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1788:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmp_int = DOBJECT_STATUS_UP == atoi(row[1]) ? atoi(row[2]) : atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1788:65: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmp_int = DOBJECT_STATUS_UP == atoi(row[1]) ? atoi(row[2]) : atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1870:51: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (SUCCEED == int_in_list(condition->value, atoi(row[1]))) data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1874:51: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (SUCCEED != int_in_list(condition->value, atoi(row[1]))) data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:2196:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). condition_value = atoi(condition->value); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3016:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). operationtype = (unsigned char)atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3019:56: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). inventory_mode = (SUCCEED == DBis_null(row[3]) ? 0 : atoi(row[3])); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3369:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[ZBX_MAX_UINT64_LEN + 2]; data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3370:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char replace[ZBX_MAX_UINT64_LEN + 2]; data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_manager.c:1809:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[sizeof(results_num)]; data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:174:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:175:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). attempts = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:187:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). source = atoi(row[7]); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:188:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). object = atoi(row[8]); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:362:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:367:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maxsessions = atoi(row[15]); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:368:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maxattempts = atoi(row[16]); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:374:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). row[19], row[20], atoi(row[21])); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:481:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[TAG_NAME_LEN * 4 + 1], value[TAG_VALUE_LEN * 4 + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c:231:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:173:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_STRING_LEN], error[ITEM_ERROR_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:365:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). first = atoi(start); data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:366:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). last = atoi(last_port + 1); data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:370:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). first = last = atoi(start); data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:416:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sql[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:442:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dcheck.type = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:446:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dcheck.snmpv3_securitylevel = (unsigned char)atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:449:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dcheck.snmpv3_authprotocol = (unsigned char)atoi(row[8]); data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:450:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dcheck.snmpv3_privprotocol = (unsigned char)atoi(row[9]); data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:513:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[INTERFACE_IP_LEN_MAX], *start, *comma, dns[INTERFACE_DNS_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:862:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else if (0 != atoi(row[0])) data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:863:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). res = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:115:73: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (NULL != (row = DBfetch(result)) && SUCCEED != DBis_null(row[0]) && atoi(row[0]) > 0) data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:132:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). user_type = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:174:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perm = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:478:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(row[1]) != 1) data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:805:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sql[512]; /* do not forget to adjust size if SQLs change */ data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:896:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->ipmi_authtype = (signed char)atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:897:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->ipmi_privilege = (unsigned char)atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1053:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[ALERT_ERROR_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1063:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). script.type = (unsigned char)atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1076:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). script.execute_on = (unsigned char)atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1093:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host.tls_connect = (unsigned char)atoi(row[13]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1095:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host.ipmi_authtype = (signed char)atoi(row[14]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1096:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host.ipmi_privilege = (unsigned char)atoi(row[15]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1129:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). script.authtype = (unsigned char)atoi(row[7]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1270:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). severity = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1278:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (MEDIA_STATUS_DISABLED == atoi(row[5])) data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1300:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else if (MEDIA_TYPE_STATUS_DISABLED == atoi(row[4])) data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1417:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). condition.conditiontype = (unsigned char)atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1418:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). condition.op = (unsigned char)atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1527:80: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (SUCCEED == check_operation_conditions(event, operationid, (unsigned char)atoi(row[3]))) data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1531:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch (atoi(row[1])) data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1625:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). operationtype = (unsigned char)atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1690:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). operationtype = (unsigned char)atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1803:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1908:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2096:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ack.clock = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2098:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ack.action = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2099:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ack.old_severity = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2100:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ack.new_severity = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2589:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). esc_nextcheck = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2607:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). escalation->esc_step = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2608:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). escalation->status = atoi(row[7]); data/zabbix-5.0.5+dfsg/src/zabbix_server/events.c:755:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *expression, error[256]; data/zabbix-5.0.5+dfsg/src/zabbix_server/events.c:1563:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). diff->problem_count = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/events.c:2176:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). object = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/history_compress.c:123:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). age = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:308:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). min_clock = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:423:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value_type = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:684:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rule->min_clock = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:696:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:832:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:863:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:1114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sleeptext[25]; data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httppoller.c:71:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). res = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:117:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char types[3]; data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:136:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch (types[num] = (unsigned char)atoi(row[0])) data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:266:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char types[3]; data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:286:65: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_HTTPITEM_TYPE_RSPCODE != (types[num] = (unsigned char)atoi(row[0])) && data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:388:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:569:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:650:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[CURL_ERROR_SIZE]; data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:721:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). db_httpstep.no = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:737:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). db_httpstep.post_type = atoi(row[8]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:770:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). db_httpstep.follow_redirects = atoi(row[9]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:771:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). db_httpstep.retrieve_mode = atoi(row[10]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:1125:65: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (HTTPTEST_AUTH_NONE != (httptest.httptest.authentication = atoi(row[6]))) data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:1145:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httptest.httptest.retries = atoi(row[10]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:1159:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httptest.httptest.verify_peer = atoi(row[14]); data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:1160:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). httptest.httptest.verify_host = atoi(row[15]); data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[IPMI_SENSOR_ID_SZ]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:168:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, id, id_len); data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char domain_name[IPMI_DOMAIN_NAME_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_str[2 * IPMI_SENSOR_ID_SZ + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:388:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[IPMI_SENSOR_ID_SZ]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:392:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char full_name[IPMI_SENSOR_NAME_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:408:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s->id, id, sizeof(id)); data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:434:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_str[2 * IPMI_SENSOR_ID_SZ + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:532:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char full_name[IPMI_SENSOR_NAME_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:623:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[IPMI_SENSOR_ID_SZ]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:624:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_str[2 * IPMI_SENSOR_ID_SZ + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:693:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_str[2 * IPMI_SENSOR_ID_SZ + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:786:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_str[2 * IPMI_SENSOR_ID_SZ + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:935:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_str[2 * IPMI_SENSOR_ID_SZ + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1016:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_str[2 * IPMI_SENSOR_ID_SZ + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1094:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c->val, val, sz); data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1142:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char control_name[128]; /* internally defined CONTROL_ID_LEN is 32 in OpenIPMI 2.0.22 */ data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char control_name[128]; /* internally defined CONTROL_ID_LEN is 32 in OpenIPMI 2.0.22 */ data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1290:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entity_name[IPMI_ENTITY_NAME_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1387:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[8], str[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1497:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *addrs[2] = {NULL}, *ports[2] = {NULL}; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1499:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char domain_name[11]; /* max int length */ data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1580:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IPMI_DOMAIN_NAME_LEN], *domain_name = (char *)cb_data; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1611:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char domain_name[11]; /* max int length */ data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1835:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char state_name[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1999:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c_name, command, sz_c_name); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:182:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). condition->op = (unsigned char)atoi(op); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *expression, id[ZBX_MAX_UINT64_LEN + 2], *p, error[256]; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:679:55: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->operationtype = (unsigned char)atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:680:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->operator = (unsigned char)atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:683:76: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->status = FAIL == DBis_null(row[5]) ? (unsigned char)atoi(row[5]) : data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:686:78: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->discover = FAIL == DBis_null(row[6]) ? (unsigned char)atoi(row[6]) : data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:698:78: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override_operation->severity = FAIL == DBis_null(row[10]) ? (unsigned char)atoi(row[10]) : data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:720:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[14]) : HOST_INVENTORY_COUNT; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:834:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override->step = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:836:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override->filter.evaltype = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:838:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). override->stop = (unsigned char)atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:1295:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). filter.evaltype = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:182:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(row[2]) != width) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:185:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(row[3]) != height) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:194:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[6]) != show_work_period) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:197:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[7]) != show_triggers) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:200:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[8]) != graphtype) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:203:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[9]) != show_legend) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:206:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[10]) != show_3d) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:215:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[13]) != ymin_type) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:220:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[15]) != ymax_type) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:225:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). graph->lastcheck = atoi(row[17]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:226:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). graph->ts_delete = atoi(row[18]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:295:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gitem->sortorder = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:1351:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). width = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:1352:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). height = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:292:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->lastcheck = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:293:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->ts_delete = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:304:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((char)atoi(row[7]) != ipmi_authtype) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:307:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[8]) != ipmi_privilege) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:316:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(row[12]) != tls_connect) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:319:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(row[13]) != tls_accept) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:337:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). host->inventory_mode_orig = (char)atoi(row[11]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:962:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). group->lastcheck = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:963:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). group->ts_delete = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:1420:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pair.second = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3052:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). interface->type = (unsigned char)atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3053:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). interface->main = (unsigned char)atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3054:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). interface->useip = (unsigned char)atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3312:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). interface_type, (unsigned char)atoi(row[4]), data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3313:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[5]), row[6], row[7], row[8], data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3314:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[9]), (unsigned char)atoi(row[10]), row[11], data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3314:51: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[9]), (unsigned char)atoi(row[10]), row[11], data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3315:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). row[12], (unsigned char)atoi(row[13]), row[14], row[15], data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3316:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[16]), (unsigned char)atoi(row[17]), row[18]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3316:52: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[16]), (unsigned char)atoi(row[17]), row[18]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3321:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). interface_type, (unsigned char)atoi(row[4]), data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3322:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (unsigned char)atoi(row[5]), row[6], row[7], row[8], data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3424:58: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = get_interface_type_by_item_type((unsigned char)atoi(row[1])); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3580:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ipmi_authtype = (char)atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3637:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). inventory_mode_proto = (char)atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:627:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). item->lastcheck = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:628:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). item->ts_delete = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:636:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[6]) != item_prototype->type) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:639:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[7]) != item_prototype->value_type) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:676:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[19]) != item_prototype->authtype) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:718:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[33]) != item_prototype->follow_redirects) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:721:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[34]) != item_prototype->post_type) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:730:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[37]) != item_prototype->retrieve_mode) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:733:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[38]) != item_prototype->request_method) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:736:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[39]) != item_prototype->output_format) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:748:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[43]) != item_prototype->verify_peer) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:751:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[44]) != item_prototype->verify_host) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:754:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[46]) != item_prototype->allow_traps) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:828:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). preproc_op->step = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:829:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). preproc_op->type = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:831:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). preproc_op->error_handler = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:894:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[MAX_STRING_LEN], *errmsg = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char param1[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *param2; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1587:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1682:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1865:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:4307:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). application->lastcheck = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:4308:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). application->ts_delete = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:4616:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_FLAG_DISCOVERY_CREATED != atoi(row[2])) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:5031:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). preproc_op->step = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:5032:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). preproc_op->type = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:5034:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). preproc_op->error_handler = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_protocol.c:322:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(size, message.data, sizeof(zbx_uint64_t)); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:426:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[4]) != trigger_prototype->type) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:429:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). trigger->priority = (unsigned char)atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:431:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[9]) != trigger_prototype->recovery_mode) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:434:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[10]) != trigger_prototype->correlation_mode) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:437:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((unsigned char)atoi(row[12]) != trigger_prototype->manual_close) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:448:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). trigger->lastcheck = atoi(row[14]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:449:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). trigger->ts_delete = atoi(row[15]); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:896:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ZBX_MAX_UINT64_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:1032:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[64]; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:2298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ZBX_MAX_UINT64_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c:164:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char driver_name[MAX_STRING_LEN + 1], driver_ver[MAX_STRING_LEN + 1], data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c:512:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c:631:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_STRING_LEN], *p; data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:278:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). svc_type = (unsigned char)atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:283:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = (unsigned short)atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:289:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = (unsigned short)atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:351:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_DISCOVERY_VALUE == (host_source = atoi(row[6]))) data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:402:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_DISCOVERY_VALUE == (name_source = atoi(row[7]))) data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:489:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = (unsigned short)atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:490:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). flags_int = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:508:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tls_accepted = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:546:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psk_identity[HOST_TLS_PSK_IDENTITY_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:547:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psk[HOST_TLS_PSK_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/pinger/pinger.c:412:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN], *addr = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_server/pinger/pinger.c:518:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[ITEM_ERROR_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.c:172:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buf, replace[16], *errstr = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.c:316:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_external.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[ITEM_ERROR_LEN_MAX], *cmd = NULL, *buf = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_http.c:213:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char url[ITEM_URL_LEN_MAX], errbuf[CURL_ERROR_SIZE], *error = NULL, *headers, *line, *buffer; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal.c:108:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_java.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:418:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:611:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char localname[64]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:645:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:688:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(strval_dyn, var->val.string, var->val_len); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:748:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[21]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:813:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char printed_oid[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:970:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(oid_k + 1, var_oid, var_len * sizeof(oid)); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1018:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oid_index[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1058:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(anOID, rootOID, rootOID_len * sizeof(oid)); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1219:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)anOID, (char *)var->name, var->name_length * sizeof(oid)); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1358:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sent_oid[ITEM_SNMP_OID_LEN_MAX], received_oid[ITEM_SNMP_OID_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1762:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oid_translated[ITEM_SNMP_OID_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1830:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char to_verify_oids[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1831:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char query_and_ignore_type[MAX_SNMP_ITEMS]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1832:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char index_oids[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1833:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char index_values[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1834:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oids_translated[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1846:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char method[8]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:2030:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oids_translated[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:2070:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_BUFFER_LEN], *userauthlist, *publickey = NULL, *privatekey = NULL, *ssherr, *output; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c:328:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_BUFFER_LEN], userauthlist[64]; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/poller.c:426:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRING_LEN], value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:51:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). triggers_num = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:309:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event.source = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:310:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event.object = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:312:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event.clock = atoi(row[4]); data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:313:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event.value = atoi(row[5]); data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:314:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event.acknowledged = atoi(row[6]); data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:315:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). event.ns = atoi(row[7]); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:501:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char params_raw[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:775:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pattern[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:946:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32], *ptr; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1073:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char min[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *max; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1432:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pattern[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *output; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1632:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pattern[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *output, *value_out = NULL, data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1753:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num_buf[ZBX_MAX_UINT64_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1819:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(delim, p, del_sz); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1846:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(delim, params, delim_sz); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1864:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(quote, params, quote_sz); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:2047:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *new_string, search_str[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.c:622:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(target, source, sizeof(zbx_preproc_item_value_t)); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.c:630:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(target->ts, source->ts, sizeof(zbx_timespec_t)); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.c:686:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&request->value, value, sizeof(zbx_preproc_item_value_t)); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c:66:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*value_str, value_desc, len); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c:67:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*value_str + len, "...", ZBX_CONST_STRLEN("...") + 1); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c:72:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*value_str, value_desc, len + 1); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:87:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(offset, (zbx_uint32_t *)&field_size, sizeof(zbx_uint32_t)); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:89:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(offset + sizeof(zbx_uint32_t), fields[i].value, field_size); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:93:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(offset, fields[i].value, field_size); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:102:60: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. field_size = (NULL != fields[i].value) ? strlen((const char *)fields[i].value) + 1 : 0; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:1051:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&size, message.data, sizeof(zbx_uint64_t)); data/zabbix-5.0.5+dfsg/src/zabbix_server/proxypoller/proxypoller.c:475:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&proxy_old, &proxy, sizeof(DC_PROXY)); data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[ITEM_ERROR_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c:505:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (-1 == (trap_fd = open(CONFIG_SNMPTRAP_FILE, O_RDONLY))) data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:75:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0); data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:75:70: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0); data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:75:84: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0); data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:89:55: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task->data = (void *)zbx_tm_remote_command_create(atoi(row[4]), row[12], atoi(row[5]), data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:89:78: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task->data = (void *)zbx_tm_remote_command_create(atoi(row[4]), row[12], atoi(row[5]), data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:90:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). atoi(row[6]), atoi(row[7]), row[8], row[9], row[10], row[11], data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:90:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). atoi(row[6]), atoi(row[7]), row[8], row[9], row[10], row[11], data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:112:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). atoi(row[19])); data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:213:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi(row[0]); data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:418:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (ZBX_TM_STATUS_INPROGRESS == atoi(row[1])) data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:589:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). data_type = atoi(row[1]); data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:677:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clock = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:678:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl = atoi(row[3]); data/zabbix-5.0.5+dfsg/src/zabbix_server/timer/timer.c:299:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pair.second = atoi(row[2]); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dns[INTERFACE_DNS_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip_addr[INTERFACE_IP_LEN_MAX]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:215:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (0 == ((unsigned int)atoi(row[2]) & sock->connection_type)) data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:281:71: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). old_port_v = (unsigned short)(SUCCEED == DBis_null(old_port)) ? 0 : atoi(old_port); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:282:88: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). old_flag_v = (zbx_conn_flags_t)(SUCCEED == DBis_null(old_flag)) ? ZBX_CONN_DEFAULT : atoi(old_flag); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:292:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (HOST_STATUS_MONITORED != atoi(row[1])) data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:553:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[HOST_HOST_LEN_MAX], tmp[MAX_STRING_LEN], ip[INTERFACE_IP_LEN_MAX], data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:736:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.c:65:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (SUCCEED == (ret = atoi(row[0]))) data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char execute_on_s[MAX_ID_LEN + 1], hostid_s[MAX_ID_LEN + 1], proxy_hostid_s[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:323:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_STRING_LEN], sessionid[MAX_STRING_LEN], limit_str[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:482:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[ZBX_MAX_UINT64_LEN + 1], sessionid[MAX_STRING_LEN], *sendto = NULL, *subject = NULL, data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:560:62: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). size = zbx_alerter_serialize_alert_send(&data, mediatypeid, atoi(row[0]), row[1], row[2], row[3], row[4], data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:562:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). smtp_authentication, row[13], atoi(row[14]), atoi(row[15]), row[16], content_type, row[18], data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:562:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). smtp_authentication, row[13], atoi(row[14]), atoi(row[15]), row[16], content_type, row[18], data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:654:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(row[0]) + ZBX_USER_ONLINE_TIME < now) data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:944:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_STRING_LEN], sessionid[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1026:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_STRING_LEN], error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1045:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char from_str[ZBX_MAX_UINT64_LEN + 1], to_str[ZBX_MAX_UINT64_LEN + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1124:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1237:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value_dec[MAX_BUFFER_LEN], lastlogsize[ZBX_MAX_UINT64_LEN], timestamp[11], data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1257:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). av.timestamp = atoi(timestamp); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1259:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). av.severity = atoi(severity); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1336:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s, (zbx_socket_t *)((zbx_thread_args_t *)args)->args, sizeof(zbx_socket_t)); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_expressions_evaluate.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_expressions_evaluate.c:79:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char evaluate_error[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[ZBX_MAX_UINT64_LEN + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN + 1], **pvalue; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:281:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). item.host.ipmi_authtype = atoi(tmp); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:283:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). item.host.ipmi_authtype = atoi(DBget_field(table_hosts, "ipmi_authtype")->default_value); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:382:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sessionid[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_ID_LEN + 1]; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_LEN], *step_params = NULL, *error_handler_params = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:78:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *value_type = atoi(buffer); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:155:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). step_type = atoi(buffer); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:162:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). error_handler = atoi(buffer); data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *values[2] = {NULL, NULL}, *preproc_error = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:1811:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xml[MAX_STRING_LEN], *error_object = NULL, *username_esc = NULL, *password_esc = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:1921:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:1971:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token_esc, post[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2069:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *value = NULL, *id_esc; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *group = NULL, *key = NULL, *rollup = NULL, *stats = NULL, data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], props[MAX_STRING_LEN], *vmid_esc; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2591:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *uuid_xpath[3] = {NULL, ZBX_XPATH_VM_UUID(), ZBX_XPATH_VM_INSTANCE_UUID()}; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2659:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2708:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *uuid = NULL, *name = NULL, *path, *id_esc, *value, *error = NULL; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2852:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], props[MAX_STRING_LEN], *hvid_esc; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2973:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3082:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3476:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN * 2]; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3551:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN]; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3603:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *event_session_esc; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3654:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *event_session_esc; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3699:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *event_session_esc; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3892:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). key = (unsigned int) atoi(value); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4056:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *value; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4094:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). xml_event.id = (unsigned int) atoi(value); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_STRING_LEN], *clusterid_esc; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4356:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xpath[MAX_STRING_LEN], *name; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4486:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (-1 == atoi(val)) data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4573:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). service->major_version = atoi(version); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4583:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). service->minor_version = atoi(strlen(UNPARSED_SERVICE_MAJOR_VERSION_DELIM) + version_without_major); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4747:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAX_STRING_LEN / 8]; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:5268:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st_str[ZBX_XML_DATETIME]; data/zabbix-5.0.5+dfsg/include/common.h:52:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). #ifdef strncpy data/zabbix-5.0.5+dfsg/include/common.h:53:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). # undef strncpy data/zabbix-5.0.5+dfsg/include/common.h:55:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). #define strncpy ERROR_DO_NOT_USE_STRNCPY_FUNCTION_TRY_TO_USE_ZBX_STRLCPY data/zabbix-5.0.5+dfsg/include/common.h:67:8: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. #ifdef strncat data/zabbix-5.0.5+dfsg/include/common.h:68:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. # undef strncat data/zabbix-5.0.5+dfsg/include/common.h:70:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. #define strncat ERROR_DO_NOT_USE_STRNCAT_FUNCTION_TRY_TO_USE_ZBX_STRLCAT data/zabbix-5.0.5+dfsg/include/comms.h:39:44: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define ZBX_TCP_READ(s, b, bl) ((ssize_t)read((s), (b), (bl))) data/zabbix-5.0.5+dfsg/include/comms.h:126:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define zbx_tcp_send(s, d) zbx_tcp_send_ext((s), (d), strlen(d), ZBX_TCP_PROTOCOL, 0) data/zabbix-5.0.5+dfsg/include/comms.h:127:69: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define zbx_tcp_send_to(s, d, timeout) zbx_tcp_send_ext((s), (d), strlen(d), ZBX_TCP_PROTOCOL, timeout) data/zabbix-5.0.5+dfsg/include/comms.h:129:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define zbx_tcp_send_raw(s, d) zbx_tcp_send_ext((s), (d), strlen(d), 0, 0) data/zabbix-5.0.5+dfsg/include/zbxserialize.h:26:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str##_len = (NULL != str ? strlen(str) + 1 : 0); \ data/zabbix-5.0.5+dfsg/include/zbxserialize.h:30:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str_len = (NULL != str ? strlen(str) + 1 : 0); \ data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/algodefs.c:262:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(data, strlen((const char *)data), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/evaluate.c:977:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 == strlen(res.data.str)) data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/evaluate.c:1113:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (1 < strlen(in) && '-' == in[0]) data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/prediction.c:875:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (0 == strncmp(fit_str, "polynomial", strlen("polynomial"))) data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/prediction.c:879:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (SUCCEED != is_uint_range(fit_str + strlen("polynomial"), k, 1, 6)) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/alias.c:102:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_name = strlen(alias->name); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/alias.c:109:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_value = strlen(alias->value); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/file.c:113:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (0 >= (nbytes = read(fd, buf, count))) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/iprange.c:61:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(address); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:633:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename, line, (zbx_fs_size_t)(strlen(str) + 1)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:960:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (SUCCEED == time_period_parse(&tp, period, (NULL == next ? (int)strlen(period) : (int)(next - period)))) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:1925:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = NULL == delim ? (int)strlen(str) : delim - str; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:1964:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NULL == (delim = strchr(str, ';')) ? (int)strlen(str) : (int)(delim - str), str); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2001:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NULL == (delim = strchr(str, ';')) ? (int)strlen(str) : (int)(delim - str))) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2007:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NULL == delim ? (int)strlen(str) : (int)(delim - str), str); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2028:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NULL == (delim = strchr(str, ';')) ? (int)strlen(str) : (int)(delim - str))) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2036:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NULL == delim ? (int)strlen(str) : (int)(delim - str), str); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2099:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (NULL == delim ? (int)strlen(interval_str) : (int)(delim - interval_str))) || data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2118:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (NULL == delim ? (int)strlen(interval_str) : (int)(delim - interval_str)))) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2145:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (NULL == delim ? (int)strlen(interval_str) : (int)(delim - interval_str)), data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2596:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr = list + strlen(list); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:3346:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(str); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:3382:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(str) - 1; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:89:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arg_next = argv[i] + strlen(argv[i]) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:118:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arg_next = environ[i] + strlen(environ[i]) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:144:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(argv_int[i - 1]); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:168:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len0 = strlen(argv[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:217:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). start_pos = strlen(argv_int[0]); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:219:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). start_pos = strlen(ps_buf); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:240:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pstat(PSTAT_SETCMD, pst, strlen(ps_buf), 0, 0); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:93:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pos = ZBX_CONST_STRLEN(ZBX_SPACE1) + strlen(progname); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:99:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(*p); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:353:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zbx_strncpy_alloc(str, alloc_len, offset, src, strlen(src)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:377:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (long)strlen(sub_str1); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:385:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). diff = (long)strlen(sub_str2) - len; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:388:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_str = (char *)zbx_malloc(new_str, (size_t)(strlen(str) + count*diff + 1)*sizeof(char)); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:496:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (p = str + strlen(str) - 1; p >= str && NULL != strchr(charlist, *p); p--) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:812:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_dest = strlen(dest); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:813:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_src = strlen(src); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1254:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz_h = strlen(haystack); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1255:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz_n = strlen(needle); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2109:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(text); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2398:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cesu8); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2518:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src_size = strlen(src); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2519:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). delim_size = strlen(delim); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2649:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz_value = strlen(value); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2654:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz_data = *r + strlen(*data + *r); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:3009:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (int)strlen(context) + 2 + quotes; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:3220:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != (sz_src = strlen(*param)) && '\\' == (*param)[sz_src - 1]) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:3263:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). params_len = strlen(params) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5359:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(value); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5529:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). right_size = strlen(src) - (size_t)(delimiter_ptr - src); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:392:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((unsigned) (s - nextchar) == strlen (p->name)) data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:419:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:429:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:459:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:476:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:480:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nextchar += strlen (nextchar); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:360:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). telnet_socket_write(socket_fd, username, strlen(username)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:380:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). telnet_socket_write(socket_fd, password, strlen(password)); data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:422:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). offset_lf = strlen(command); data/zabbix-5.0.5+dfsg/src/libs/zbxcommshigh/comms.c:69:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (FAIL == (ret = zbx_tcp_send_ext(sock, json.buffer, strlen(json.buffer), protocol, timeout))) data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:409:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(line); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1386:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 == (len = strlen(buf))) data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:2417:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). my_psk_identity_len = strlen(my_psk_identity); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:2848:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). my_psk_identity_len = strlen(my_psk_identity); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:3637:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). psk_identity_len_for_cb = (NULL == tls_arg1 ? 0 : strlen(tls_arg1)); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:4673:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). attr->psk_identity_len = strlen(attr->psk_identity); data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:4687:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). attr->psk_identity_len = strlen(attr->psk_identity); data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:638:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (text *)user, (ub4)(NULL != user ? strlen(user) : 0), data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:639:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (text *)password, (ub4)(NULL != password ? strlen(password) : 0), data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:640:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (text *)connect, (ub4)strlen(connect), data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1143:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return OCIStmtPrepare(oracle.stmthp, oracle.errhp, (text *)sql, (ub4)strlen((char *)sql), (ub4)OCI_NTV_SYNTAX, data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1314:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sizes[i] = strlen(rows[i][position].str); data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1650:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = OCIStmtPrepare(result->stmthp, oracle.errhp, (text *)sql, (ub4)strlen((char *)sql), data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3493:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). item_value->value.value_str.len = strlen(value_orig) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:115:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(source) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:597:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). REFCOUNT_FIELD_SIZE + strlen(str) + 1, REFCOUNT_FIELD_SIZE); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:5780:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(item_hk->key, strlen(item_hk->key), hash); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:5799:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(host_h->host, strlen(host_h->host), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:5836:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(hmacro_hm->macro, strlen(hmacro_hm->macro), hash); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:5878:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(interface_addr->addr, strlen(interface_addr->addr), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6021:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(psk_i->tls_psk_identity, strlen(psk_i->tls_psk_identity), data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6054:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(session->token, strlen(session->token), hash); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6512:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(dc_host->tls_dc_psk->tls_psk_identity) != attr.psk_identity_len || data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6984:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz_function = strlen(src_function->function) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6985:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz_parameter = strlen(src_function->parameter) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:9900:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sz != strlen(value)) data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:11579:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(parent_group->name); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:12733:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_alloc = params_len = strlen(params); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:62:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). REFCOUNT_FIELD_SIZE + strlen(str) + 1, REFCOUNT_FIELD_SIZE); data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.c:1027:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.c:1075:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). freed = strlen(str) + REFCOUNT_FIELD_SIZE + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:109:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL != value && 0 == strlen(value)) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1928:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(host_name_sample); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:3515:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytes_num = strlen(text); data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:73:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ('/' == export_dir[strlen(export_dir) - 1]) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:74:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). export_dir[strlen(export_dir) - 1] = '\0'; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:217:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(proxy->tls_psk_identity) != attr.psk_identity_len || data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:304:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(host->tls_psk_identity) != attr.psk_identity_len || data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2467:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len1 = strlen(row[5]) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2468:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len2 = strlen(row[7]) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3783:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ZBX_DATA_SESSION_TOKEN_SIZE != (token_len = strlen(token))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4660:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ZBX_DATA_SESSION_TOKEN_SIZE != (token_len = strlen(value))) data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:480:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(srcid); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:80:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pnext = params + strlen(params); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:930:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_len = strlen(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:936:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (ITEM_USERNAME_LEN < strlen(user)) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:938:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (ITEM_PASSWORD_LEN < strlen(password)) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2050.c:809:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = row[1] + strlen(row[1]); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:885:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(expression + cut->l, expression + cut->r + 1, strlen(expression + cut->r + 1) + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:872:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strlen(row[1])) data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3050.c:1350:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). current_len = strlen(unquoted_parameter); data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4000.c:64:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newmacro_len = strlen(newmacro); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2184:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define DUK_STRLEN strlen data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3817:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3820:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3823:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3826:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3829:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3832:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3835:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3838:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3841:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3844:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3847:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3850:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3853:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3856:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3859:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3862:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3865:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3868:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3871:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3874:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3877:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3880:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3883:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3886:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3889:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3892:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3895:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3898:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3901:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3904:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3907:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3910:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3913:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3916:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3919:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3922:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3925:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3928:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3931:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3934:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3937:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3940:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3943:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3946:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3949:8: [1] (buffer) mismatch: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error mismatch in token defines data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:368:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(script); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/global.c:47:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str_base64_encode_dyn(str, &b64str, (int)strlen(str)); data/zabbix-5.0.5+dfsg/src/libs/zbxembed/global.c:75:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_size = (int)strlen(str) * 3 / 4 + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:456:20: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 < (rc = read(fd, tmp_buf, sizeof(tmp_buf) - 1)) && MAX_EXECUTE_OUTPUT_LEN > offset + rc) data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c:252:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). codepoints = (zbx_uint32_t *)zbx_malloc(NULL, strlen(text) * sizeof(zbx_uint32_t)); data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c:358:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). url_alloc = url_len = strlen(*url) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c:360:83: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zbx_replace_mem_dyn(url, &url_alloc, &url_len, domain - *url, ptr - domain, iri, strlen(iri)); data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/urlencode.c:41:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer = (char *)zbx_malloc(NULL, strlen(source) * 3 + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/urlencode.c:81:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *target, *buffer = (char *)zbx_malloc(NULL, strlen(source) + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:187:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ZBX_KIBIBYTE > strlen(out)) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:193:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) >= strlen(dst) && 0 == strncmp(p, dst, strlen(dst))) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:193:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) >= strlen(dst) && 0 == strncmp(p, dst, strlen(dst))) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:193:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) >= strlen(dst) && 0 == strncmp(p, dst, strlen(dst))) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:213:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ZBX_KIBIBYTE > strlen(out) && 0 != strlen(out)) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:213:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ZBX_KIBIBYTE > strlen(out) && 0 != strlen(out)) data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:248:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ZBX_KIBIBYTE > strlen(out) && NULL != strstr(out, dst)) || TIMEOUT_ERROR == ret) data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:122:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_len = strlen(service_name); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:236:20: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (-1 == (n = read(fd, buffer + *read_size, size - *read_size))) data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1478:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ipc_path_root_len = strlen(path); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1535:9: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). mode = umask(077); data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1592:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(mode); data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:396:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_data = strlen(data); data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:302:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (MAX_STRING_LEN <= strlen(filename)) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:110:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). 4 <= strlen(*buf) && data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:308:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str_base64_encode_dyn(localbody, &base64, strlen(localbody)); data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:448:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strncmp(response, OK_220, strlen(OK_220))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:460:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (-1 == write(s.socket, cmd, strlen(cmd))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:474:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strncmp(response, OK_250, strlen(OK_250))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:487:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (-1 == write(s.socket, cmd, strlen(cmd))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:499:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strncmp(response, OK_250, strlen(OK_250))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:512:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (-1 == write(s.socket, cmd, strlen(cmd))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:525:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strncmp(response, OK_250, strlen(OK_250)) && 0 != strncmp(response, OK_251, strlen(OK_251))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:525:88: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strncmp(response, OK_250, strlen(OK_250)) && 0 != strncmp(response, OK_251, strlen(OK_251))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:536:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (-1 == write(s.socket, cmd, strlen(cmd))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:548:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strncmp(response, OK_354, strlen(OK_354))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:555:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = write(s.socket, cmdp, strlen(cmdp)); data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:569:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (-1 == write(s.socket, cmd, strlen(cmd))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:581:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != strncmp(response, OK_250, strlen(OK_250))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:591:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (-1 == write(s.socket, cmd, strlen(cmd))) data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:702:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). payload_status.payload_len = strlen(payload_status.payload); data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:33:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:166:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 < (nbytes = read(fd, ebuf, buffer + sizeof(buffer) - 1 - ebuf))) data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:596:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size -= strlen(descr) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:597:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base = (void *)((char *)base + strlen(descr) + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:601:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size -= strlen(param) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:602:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base = (void *)((char *)base + strlen(param) + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:813:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += strlen(descr) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:814:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += strlen(param) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxnix/daemon.c:361:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(0002); data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.c:347:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line[strlen(line) - 1] = '\0'; /* remove trailing '\n' */ data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:321:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(data + pos) + pos; data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:1090:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(data + pos); data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:1338:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). loc->r = strlen(data + pos) + pos - 1; data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:1430:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(data + pos); data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:1477:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). error_alloc = (NULL == *error ? 0 : strlen(*error) + 1); data/zabbix-5.0.5+dfsg/src/libs/zbxregexp/zbxregexp.c:248:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 <= (r = pcre_exec(regexp->pcre_regexp, pextra, string, strlen(string), flags, 0, ovector, ovecsize))) data/zabbix-5.0.5+dfsg/src/libs/zbxregexp/zbxregexp.c:477:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy_alloc(&ptr, &size, &offset, pstart, strlen(pstart), limit); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:2365:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zbx_snprintf(*value, strlen(*value) + 1, ZBX_FS_UI64, last_uint64 & (zbx_uint64_t)mask); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3314:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(value) + 1 + MAX_BUFFER_LEN; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:2517:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(macro) - ZBX_CONST_STRLEN(MVAR_EVENT_TAGS_PREFIX) - 1, &name)) data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:2763:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). replace_to_len = strlen(*replace_to); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:2921:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data_alloc = data_len = strlen(*data) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:4673:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token.loc.r - token.loc.l + 1, replace_to, strlen(replace_to)); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:4946:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(func->function, strlen(func->function), hash); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:4947:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(func->parameter, strlen(func->parameter), hash); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5616:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). replace_to_alloc = strlen(replace_to) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5700:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sz != strlen(replace_to)) data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5715:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data_alloc = data_len = strlen(*data) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5717:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->loc.r - token->loc.l + 1, replace_to, strlen(replace_to)); data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:6338:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL == (doc = xmlReadMemory(*data, strlen(*data), "noname.xml", NULL, 0))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/common.c:137:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __func__, command, (zbx_fs_size_t)strlen(cmd_result), cmd_result); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:183:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ('\0' != *(*dir + 1) && ':' != *(*dir + strlen(*dir) - 2)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:237:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (tmp = template_list; '\0' != *tmp; tmp += strlen(tmp) + 1) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:538:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dir_len = strlen(dir); /* store this value before giving away pointer ownership */ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:715:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dir_len = strlen(dir); /* store this value before giving away pointer ownership */ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:884:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dir_len = strlen(dir); /* store this value before giving away pointer ownership */ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:1061:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dir_len = strlen(dir); /* store this value before giving away pointer ownership */ data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:670:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 < (nbytes = (int)read(f, buf, sizeof(buf)))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:809:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 < (nr = (int)read(f, buf, sizeof(buf)))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c:344:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t if_name_sz = strlen(if_name) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:346:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = tmp + strlen(tmp) - 1; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:84:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c += strlen(c); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:159:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 != (nbytes = read(fd, smbuf + smbios_len, file_buf.st_size - smbios_len))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:303:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 != (n = read(fd, *buffer + offset, *buffer_alloc - offset))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:386:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 != (n = read(fd, *buffer + offset, *buffer_alloc - offset))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:266:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). label_len = strlen(label); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:271:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). guard_len = strlen(guard); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:860:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(fd, tmp, sizeof(tmp)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:910:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 < (n = read(fd, *cmdline + *cmdline_nbytes, cmdline_alloc - *cmdline_nbytes))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:1026:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (-1 == (n = read(fd, tmp, sizeof(tmp) - 1))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:112:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(buf) - 1] = '\0'; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:444:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ZBX_DO_ONE != do_task && 0 != isdigit(name[strlen(name) - 1])) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:447:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ZBX_DO_ONE != do_task && 0 == isalpha(name[strlen(name) - 1])) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/sensors.c:80:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 == strncmp(name, sensor_type_s[i], len = strlen(sensor_type_s[i]))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:249:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(fd, psinfo, sizeof(*psinfo)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:747:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(fd, &psinfo, sizeof(psinfo)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:760:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(fd, &prusage, sizeof(prusage)); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:175:70: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (1 == get_rparams_num(&request) && 0 == strcmp("[*]", itemkey + strlen(get_rkey(&request)))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:631:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). empty_arguments = (1 == request->nparam && 0 == strlen(request->params[0])); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1542:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 != (sz_src = strlen(*param)) && '\\' == (*param)[sz_src - 1]) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1650:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). value_len = strlen(*pvalue) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1828:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 != (n = read(fds[0], buffer, sizeof(buffer)))) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:55:37: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename, line, (zbx_fs_size_t)((wcslen(str) + 1) * sizeof(wchar_t))); data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:182:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 < (sz = strlen(*fsname)) && '\\' == (*fsname)[--sz]) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:186:23: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (MAX_PATH < (sz = wcslen(path) + 1) && 0 != wcsncmp(path, L"\\\\?\\", 4)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:274:24: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (p = buffer, sz = wcslen(p); sz > 0; p += sz + 1, sz = wcslen(p)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:274:61: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (p = buffer, sz = wcslen(p); sz > 0; p += sz + 1, sz = wcslen(p)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:298:25: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (p = buffer, sz = wcslen(p); sz > 0; p += sz + 1, sz = wcslen(p)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:298:62: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (p = buffer, sz = wcslen(p); sz > 0; p += sz + 1, sz = wcslen(p)) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:415:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 < (sz = strlen(mpoint_local.fsname)) && '\\' == mpoint_local.fsname[--sz]) data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/pdhmon.c:219:62: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (instance = inst_list; L'\0' != *instance; instance += wcslen(instance) + 1) data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1059:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data = zbx_tm_data_create(parent_taskid, str, strlen(str), type); data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:549:18: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). counter_base += wcslen(counter_base) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:550:18: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). counter_base += wcslen(counter_base) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:553:72: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (counter_text = counter_base; 0 != *counter_text; counter_text += wcslen(counter_text) + 1) data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:556:19: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). counter_text += wcslen(counter_text) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:573:72: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (counter_text = counter_base; 0 != *counter_text; counter_text += wcslen(counter_text) + 1) data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:576:19: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). counter_text += wcslen(counter_text) + 1; data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:225:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (DWORD)(wcslen(execName) + 1) * sizeof(wchar_t)); data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:1204:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pCh += wcslen(pCh) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:1253:18: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i++, pCh += wcslen(pCh) + 1) data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:73:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str_length = strlen(str); data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:145:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (sz = strlen(filename) - 1, separator = &filename[sz]; separator >= filename; separator--) data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:160:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(*directory); data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:272:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (length != (rc = (int)read(f, buf, (size_t)length))) data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:1854:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nbytes = (int)read(fd, buf, (size_t)BUF_SIZE); data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2613:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (-1 == (nbytes = read(fd, buf, sizeof(buf)))) data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2657:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (-1 == (nbytes = read(fd, buf, sizeof(buf)))) data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:265:15: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names_eng += wcslen(names_eng) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:266:15: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names_eng += wcslen(names_eng) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:267:15: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names_loc += wcslen(names_loc) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:268:15: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names_loc += wcslen(names_loc) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:286:15: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = (DWORD)wcslen(object) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:299:62: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (loc_name = names_loc; L'\0' != *loc_name; loc_name += wcslen(loc_name) + 1) data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:304:16: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). loc_name += wcslen(loc_name) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:313:62: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (eng_name = names_eng; L'\0' != *eng_name; eng_name += wcslen(eng_name) + 1) data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:316:16: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eng_name += wcslen(eng_name) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:867:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(eng_name); data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:871:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL != object_names[i].eng_name && len == strlen(object_names[i].eng_name) && data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:876:10: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = (wcslen(object_names[i].loc_name) + 1) * sizeof(wchar_t); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:239:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += ZBX_SIZE_T_ALIGN8(strlen(PROCSTAT_PTR(base, query->procname)) + 1); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:242:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += ZBX_SIZE_T_ALIGN8(strlen(PROCSTAT_PTR(base, query->username)) + 1); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:245:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += ZBX_SIZE_T_ALIGN8(strlen(PROCSTAT_PTR(base, query->cmdline)) + 1); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:336:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:504:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += ZBX_SIZE_T_ALIGN8(strlen(procname) + 1); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:507:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += ZBX_SIZE_T_ALIGN8(strlen(username) + 1); data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:510:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += ZBX_SIZE_T_ALIGN8(strlen(cmdline) + 1); data/zabbix-5.0.5+dfsg/src/zabbix_agent/zabbix_agentd.c:568:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (MAX_ZBX_HOSTNAME_LEN < strlen(*value)) data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:130:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (0 != (n = read(fd, buffer, sizeof(buffer)))) data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxy.c:452:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (MAX_ZBX_HOSTNAME_LEN < strlen(*value)) data/zabbix-5.0.5+dfsg/src/zabbix_proxy/servercomms.c:134:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (SUCCEED != zbx_tcp_send_ext(sock, j.buffer, strlen(j.buffer), ZBX_TCP_PROTOCOL | ZBX_TCP_COMPRESS, 0)) data/zabbix-5.0.5+dfsg/src/zabbix_proxy/servercomms.c:173:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (SUCCEED != zbx_tcp_send_ext(sock, j->buffer, strlen(j->buffer), ZBX_TCP_PROTOCOL | ZBX_TCP_COMPRESS, 0)) data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1329:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(tmp); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:2942:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). id_len = strlen(tmp); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3236:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(condition->value, strlen(condition->value), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3237:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(condition->value2, strlen(condition->value2), hash); data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c:125:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zbx_md5_append(&state, (const md5_byte_t *)sendto, strlen(sendto)); data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:247:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL != tag_filter->tag && 0 != strlen(tag_filter->tag)) data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:251:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL != tag_filter->value && 0 != strlen(tag_filter->value)) data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httpmacro.c:303:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (FAIL == httpmacro_append_pair(httptest, key, strlen(key), value, strlen(value), data, err_str)) data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httpmacro.c:303:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (FAIL == httpmacro_append_pair(httptest, key, strlen(key), value, strlen(value), data, err_str)) data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:350:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). offset = strlen(domain_name); data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:352:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (offset >= strlen(full_name) || 0 != strncmp(domain_name, full_name, offset)) data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1522:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (unsigned int)h->privilege, h->username, strlen(h->username), data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1523:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). h->password, strlen(h->password), os_hnd, NULL, &h->con))) data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:38:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). addr_len = strlen(addr) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:45:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). username_len = strlen(user) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:46:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). password_len = strlen(pwd) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:47:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sensor_len = strlen(sensor) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:48:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_len = NULL != key ? strlen(key) + 1 : 0; data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:101:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). value_len = NULL != value ? strlen(value) + 1 : 0; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:446:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). id_len = strlen(id); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:1129:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ('/' == *name || '/' == name[strlen(name) - 1]) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:1445:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(parent_rights->name) != offset) data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1802:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp_offset = strlen(tmp); data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:2591:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). params_alloc = strlen(param1) + strlen(param2) + 2; data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:2591:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). params_alloc = strlen(param1) + strlen(param2) + 2; data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c:226:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 < (len = strlen(*connection_str))) data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_aggregate.c:283:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). quote_string(&group, strlen(group)); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.c:293:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f->value = (char *)zbx_realloc(f->value, strlen(f->value) + 1); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_http.c:301:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (FAIL == is_time_suffix(item->timeout, &timeout_seconds, strlen(item->timeout))) data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple_vmware.c:1936:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ds_list[strlen(ds_list)-1] = '\0'; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple_vmware.c:2007:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hv_list[strlen(hv_list)-1] = '\0'; data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:114:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(main_key->oid, strlen(main_key->oid), hash); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:115:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(main_key->community_context, strlen(main_key->community_context), hash); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:116:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash = ZBX_DEFAULT_STRING_HASH_ALGO(main_key->security_name, strlen(main_key->security_name), hash); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:478:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). session.community_len = strlen((char *)session.community); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:485:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). session.securityNameLen = strlen(session.securityName); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:491:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). session.contextNameLen = strlen(session.contextName); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:526:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(item->snmpv3_authpassphrase), session.securityAuthKey, data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:560:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(item->snmpv3_authpassphrase), session.securityAuthKey, data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:591:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(item->snmpv3_privpassphrase), session.securityPrivKey, data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1045:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). root_string_len = strlen(oid_index); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1055:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). root_numeric_len = strlen(oid_index); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1620:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(index, strlen(index), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1914:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(oids_translated[j]); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c:51:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). responses[0].length = strlen(password); data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c:123:77: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL != (userauthlist = libssh2_userauth_list(session, item->username, strlen(item->username)))) data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:133:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_alloc = name_len = strlen(trigger->description) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:163:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). macro_len, macro, strlen(macro)); data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:181:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_alloc = name_len = strlen(trigger->description) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:506:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unescape_param(op_type, params, strlen(params), params_raw); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:837:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(params); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:951:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL == (doc = xmlReadMemory(value->data.str, strlen(value->data.str), "noname.xml", NULL, 0))) data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1347:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL == (doc = xmlReadMemory(value_str.data.str, strlen(value_str.data.str), "noname.xml", NULL, 0))) data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1529:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (FAIL == is_time_suffix(params, &timeout, strlen(params))) data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1804:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data_len = strlen(value->data.str); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:2065:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_replace = strlen(ptr + 1); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c:71:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *value_str = zbx_malloc(NULL, (len = strlen(value_desc)) + 1); data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:102:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). field_size = (NULL != fields[i].value) ? strlen((const char *)fields[i].value) + 1 : 0; data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c:445:22: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (-1 == (nbytes = read(trap_fd, buffer + offset, MAX_BUFFER_LEN - offset - 1))) data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:111:69: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). task->data = (void *)zbx_tm_data_create(parent_taskid, row[17], strlen(row[17]), data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:266:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(row[5]) != attr.psk_identity_len || data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxyconfig.c:81:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (SUCCEED != zbx_tcp_send_ext(sock, j.buffer, strlen(j.buffer), flags, CONFIG_TRAPPER_TIMEOUT)) data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxydata.c:60:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (SUCCEED == (ret = zbx_tcp_send_ext(sock, json.buffer, strlen(json.buffer), flags, 0))) data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxydata.c:169:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (SUCCEED != zbx_tcp_send_ext(sock, data, strlen(data), ZBX_TCP_PROTOCOL | ZBX_TCP_COMPRESS, CONFIG_TIMEOUT)) data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:115:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ('-' != *ptr || FAIL == is_time_suffix(ptr + 1, &delay, strlen(ptr + 1))) data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:359:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(hv->uuid, strlen(hv->uuid), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:375:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(vmi->vm->uuid, strlen(vmi->vm->uuid), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:423:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = REFCOUNT_FIELD_SIZE + strlen(str) + 1; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:462:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = REFCOUNT_FIELD_SIZE + strlen(str) + 1 + ZBX_HASHSET_ENTRY_OFFSET; data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:668:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(counter->path, strlen(counter->path), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:690:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). seed = ZBX_DEFAULT_STRING_HASH_ALGO(entity->type, strlen(entity->type), ZBX_DEFAULT_HASH_SEED); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:692:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZBX_DEFAULT_STRING_HASH_ALGO(entity->id, strlen(entity->id), seed); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2742:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(path); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4583:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). service->minor_version = atoi(strlen(UNPARSED_SERVICE_MAJOR_VERSION_DELIM) + version_without_major); data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4917:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). events_sz -= zbx_mem_required_chunk_size(strlen(event->message) + data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:6087:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL == (*xdoc = xmlReadMemory(data, (0 == len ? strlen(data) : len), ZBX_VM_NONAME_XML, NULL, ANALYSIS SUMMARY: Hits = 1794 Lines analyzed = 379918 in approximately 10.17 seconds (37372 lines/second) Physical Source Lines of Code (SLOC) = 250226 Hits@level = [0] 99 [1] 400 [2] 1317 [3] 8 [4] 66 [5] 3 Hits@level+ = [0+] 1893 [1+] 1794 [2+] 1394 [3+] 77 [4+] 69 [5+] 3 Hits/KSLOC@level+ = [0+] 7.56516 [1+] 7.16952 [2+] 5.57096 [3+] 0.307722 [4+] 0.275751 [5+] 0.0119892 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.