Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C
Examining data/condor-8.6.8~dfsg.1/externals/bundles/gsoap/2.7.10-p5/config.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/externals/bundles/krb5/1.4.3-p1/win-mac.post.h
Examining data/condor-8.6.8~dfsg.1/externals/bundles/krb5/1.4.3-p1/win-mac.pre.h
Examining data/condor-8.6.8~dfsg.1/externals/bundles/openssl/0.9.8h-p2/ossl_typ-post.h
Examining data/condor-8.6.8~dfsg.1/externals/bundles/pcre/7.6/include-darwin/pcre.h
Examining data/condor-8.6.8~dfsg.1/src/annexd/BulkRequest.cpp
Examining data/condor-8.6.8~dfsg.1/src/annexd/BulkRequest.h
Examining data/condor-8.6.8~dfsg.1/src/annexd/Functor.h
Examining data/condor-8.6.8~dfsg.1/src/annexd/FunctorSequence.cpp
Examining data/condor-8.6.8~dfsg.1/src/annexd/FunctorSequence.h
Examining data/condor-8.6.8~dfsg.1/src/annexd/PutRule.cpp
Examining data/condor-8.6.8~dfsg.1/src/annexd/PutRule.h
Examining data/condor-8.6.8~dfsg.1/src/annexd/PutTargets.cpp
Examining data/condor-8.6.8~dfsg.1/src/annexd/PutTargets.h
Examining data/condor-8.6.8~dfsg.1/src/annexd/ReplyAndClean.cpp
Examining data/condor-8.6.8~dfsg.1/src/annexd/ReplyAndClean.h
Examining data/condor-8.6.8~dfsg.1/src/annexd/annex.cpp
Examining data/condor-8.6.8~dfsg.1/src/annexd/annexd.cpp
Examining data/condor-8.6.8~dfsg.1/src/ccb/ccb_client.cpp
Examining data/condor-8.6.8~dfsg.1/src/ccb/ccb_client.h
Examining data/condor-8.6.8~dfsg.1/src/ccb/ccb_listener.cpp
Examining data/condor-8.6.8~dfsg.1/src/ccb/ccb_listener.h
Examining data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.cpp
Examining data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.h
Examining data/condor-8.6.8~dfsg.1/src/classad/attrrefs.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/cclassad.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/classad.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/attrrefs.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/cclassad.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/classad.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/classadCache.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/classadErrno.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/classadItor.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/classad_distribution.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/collection.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/collectionBase.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/common.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/debug.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/exprList.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/exprTree.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/fnCall.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/indexfile.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/jsonSink.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/jsonSource.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/lexer.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/lexerSource.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/literals.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/matchClassad.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/operators.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/query.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/sink.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/source.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/transaction.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/util.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/value.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/view.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/xmlLexer.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/xmlSink.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad/xmlSource.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classadCache.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/classad_functional_tester.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/classad_functional_tester.h
Examining data/condor-8.6.8~dfsg.1/src/classad/classad_unit_tester.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/classad_version.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/collection.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/common.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/compress.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/compress.h
Examining data/condor-8.6.8~dfsg.1/src/classad/cxi.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/debug.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/exprList.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/exprTree.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/extra_tests.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/instantiations.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/jsonSink.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/jsonSource.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/lexer.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/lexerSource.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/literals.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/man_cache_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/matchClassad.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/operators.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/optester.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/parse_classad_testdata.hpp
Examining data/condor-8.6.8~dfsg.1/src/classad/query.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/sample.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/shared.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/sink.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/source.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/test_classads.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/test_instantiations.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/test_xml.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/transaction.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/util.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/value.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/view.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/xmlLexer.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/xmlSink.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad/xmlSource.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/Stack.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/boolExpr.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/boolExpr.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/boolExpr_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/coll_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/condition.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/condition.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/conversion.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/conversion.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/gmr.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/gmr.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/interval_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/multiProfile.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/multiProfile.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/profile.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/profile.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/resourceGroup.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/resourceGroup.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/result.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/result.h
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/start_analyzer.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/testAET.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/testConversion.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_analysis/testPortGraph.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/coll-client-inst.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/coll-comm-inst.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/coll-serv-inst.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/collectionClient.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/collectionClient.h
Examining data/condor-8.6.8~dfsg.1/src/classad_support/collectionServer.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/collectionServer.h
Examining data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.h
Examining data/condor-8.6.8~dfsg.1/src/classad_support/queryProcessor.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/queryProcessor.h
Examining data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.h
Examining data/condor-8.6.8~dfsg.1/src/classad_support/remoteQuery.cpp
Examining data/condor-8.6.8~dfsg.1/src/classad_support/remoteQuery.h
Examining data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/CondorSystrayCommon.h
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/StdAfx.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/StdAfx.h
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayMinimize.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayMinimize.h
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/WindowsMessageReceiver.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/WindowsMessageReceiver.h
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdWatcherDlg.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdWatcherDlg.h
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdwatcher.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdwatcher.h
Examining data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/resource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/PipeBuffer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/PipeBuffer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/SchedDCommands.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/SchedDCommands.h
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/cgahp_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/cgahp_common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/gahp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.h
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.h
Examining data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c
Examining data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.h
Examining data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_protocol.h
Examining data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/c_plus_alloc.dead.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_basic.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_basic.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_fd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_fd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_local.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_local.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_remote.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_remote.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_special.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_special.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_syscalls.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/eprintf.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/fake_remote_syscall.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_table_interf.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/fix_gnu_fcntl.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/gtodc.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/gtodc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/machdep.LINUX.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/machdep.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/machdep.template.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/machdep_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/malloc-condor.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/malloc-user.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/malloc.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/pure_virtual.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/pvm_before_after_ckpt.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/shared_utils.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/shared_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/signals_control.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/signals_control.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/signals_support.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/syscall_mode.c
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/tmp_stack.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt/zimage.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/alarm2.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/alarm2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/constants2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/gen_lib.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/gen_lib.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/network2.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/network2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/replication.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/replication.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_constants.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_typedefs.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/signal2.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/signal2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xferstat2.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xferstat2.h
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/CollectorPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/CollectorPluginManager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/ExampleCollectorPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector.h
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector_engine.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector_engine.h
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector_stats.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector_stats.h
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/gsoap_collector.h
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/offline_plugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/offline_plugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/soap_collectorStub.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeRequest.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetAttributes.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetAttributesResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetCollector.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetCollectorResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMaster.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterIDResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetNegotiator.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetNegotiatorResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetScheduler.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSchedulerResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlot.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotIDResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSubmitter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSubmitterResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ArchType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_AttributeType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attributes.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Collector.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobConstraint.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobConstraintType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobData.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobDataType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobDetails.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobStatus.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobStatusType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Master.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Negotiator.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_OSType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceConstraint.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceConstraintType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceLocation.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ScanMode.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Scheduler.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Status.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_StatusCodeType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Submitter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterID.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetDataNode.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetDataNodeResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetJobTracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetJobTrackerResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetNameNode.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetNameNodeResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetTaskTracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetTaskTrackerResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopID.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQuery.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStartResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStateType.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStop.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResult.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartDataNode.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartDataNodeResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartJobTracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartJobTrackerResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartNameNode.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartNameNodeResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartTaskTracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartTaskTrackerResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopDataNode.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopDataNodeResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopJobTracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopJobTrackerResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopNameNode.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopNameNodeResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopTaskTracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopTaskTrackerResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ContinueJob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ContinueJobResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ControlJob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ControlJobResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_HoldJob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_HoldJobResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ReleaseJob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ReleaseJobResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_RemoveJob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_RemoveJobResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttribute.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttributeResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJobResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SuspendJob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SuspendJobResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_Locate.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_LocateResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDetails.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDetailsResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobStatus.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobStatusResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobSummaryResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionIDResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionSummary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionSummaryResponse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_AttributeRequest.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_AttributeResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetAttributes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetAttributesResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetCollector.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetCollectorResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetMaster.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetMasterID.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetMasterIDResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetMasterResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetNegotiator.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetNegotiatorResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetScheduler.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetSchedulerResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetSlot.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetSlotID.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetSlotIDResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetSlotResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetSubmitter.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCollector_GetSubmitterResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_ArchType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Attribute.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_AttributeType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Attributes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Collector.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_CollectorSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobConstraint.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobConstraintType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobData.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobDataType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobDetails.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobID.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobStatus.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobStatusType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_JobSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Master.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_MasterSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Negotiator.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_NegotiatorSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_OSType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_ResourceConstraint.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_ResourceConstraintType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_ResourceID.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_ResourceLocation.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_ResourceType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_ScanMode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Scheduler.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_SchedulerSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Slot.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_SlotSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_SlotType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Status.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_StatusCodeType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_SubmissionID.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_SubmissionSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_Submitter.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_SubmitterID.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryCommon_SubmitterSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_GetDataNode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_GetDataNodeResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_GetJobTracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_GetJobTrackerResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_GetNameNode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_GetNameNodeResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_GetTaskTracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_GetTaskTrackerResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopID.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopNameNodeStart.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopQuery.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopQueryResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopQueryResult.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopStart.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopStartResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopStateType.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopStop.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopStopResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_HadoopStopResult.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StartDataNode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StartDataNodeResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StartJobTracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StartJobTrackerResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StartNameNode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StartNameNodeResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StartTaskTracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StartTaskTrackerResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StopDataNode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StopDataNodeResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StopJobTracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StopJobTrackerResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StopNameNode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StopNameNodeResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StopTaskTracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryHadoop_StopTaskTrackerResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_ContinueJob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_ContinueJobResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_ControlJob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_ControlJobResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_HoldJob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_HoldJobResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_ReleaseJob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_ReleaseJobResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_RemoveJob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_RemoveJobResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_SetJobAttribute.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_SetJobAttributeResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_SubmitJob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_SubmitJobResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_SuspendJob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryJob_SuspendJobResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryLocator_Locate.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryLocator_LocateResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetJobData.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetJobDataResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetJobDetails.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetJobDetailsResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetJobStatus.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetJobStatusResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetJobSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetJobSummaryResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetSubmissionID.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetSubmissionIDResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetSubmissionSummary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/include/AviaryQuery_GetSubmissionSummaryResponse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/AviaryCollectorPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/AviaryCollectorService.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/AviaryCollectorService.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/AviaryCollectorServiceMacro.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/AviaryCollectorServiceSkeleton.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/AviaryCollectorServiceSkeleton.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/CollectableCodec.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/CollectableCodec.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/Collectables.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/Collectables.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/CollectorObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/CollectorObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryConversionMacros.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryProvider.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryProviderFactory.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryUtils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryUtils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/Axis2SoapProvider.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/Axis2SoapProvider.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/Axis2SslProvider.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/Axis2SslProvider.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/Axis2SslUtility.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/ClassadCodec.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/ClassadCodec.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/EndpointPublisher.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/EndpointPublisher.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_stream.c
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_stream.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_utils.c
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopPluginInstantiation.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopService.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopService.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopServiceMacro.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopServiceSkeleton.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopServiceSkeleton.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/HadoopObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/HadoopObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryJobService.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryJobService.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryJobServiceMacro.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryJobServiceSkeleton.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryJobServiceSkeleton.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryScheddPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryScheddPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryScheddPluginInstantiation.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/SchedulerObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/SchedulerObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/locator/AviaryLocatorPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/locator/AviaryLocatorService.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/locator/AviaryLocatorService.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/locator/AviaryLocatorServiceMacro.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/locator/AviaryLocatorServiceSkeleton.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/locator/AviaryLocatorServiceSkeleton.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/locator/LocatorObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/locator/LocatorObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/AviaryQueryService.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/AviaryQueryService.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/AviaryQueryServiceMacro.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/AviaryQueryServiceSkeleton.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/AviaryQueryServiceSkeleton.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/Globals.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/Globals.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/HistoryFile.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/HistoryFile.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/HistoryProcessingUtils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/HistoryProcessingUtils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/Job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/Job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/JobServerJobLogConsumer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/JobServerJobLogConsumer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/JobServerObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/JobServerObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/SubmissionObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/SubmissionObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/aviary_query_server.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/cmpstr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_dbmsd/DBMSManager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_dbmsd/DBMSManager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_dbmsd/ManagedDatabase.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_dbmsd/ManagedDatabase.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_dbmsd/dbmsd_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/declare_queues.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/getPort.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/getPort.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/code.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/daemonReader.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/condor_ttdb.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/condor_ttdb.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/tt_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/Globals.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/Globals.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/HistoryFile.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/HistoryFile.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/HistoryProcessingUtils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/HistoryProcessingUtils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/Job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/Job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/JobServerJobLogConsumer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/JobServerJobLogConsumer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/JobServerObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/JobServerObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/SubmissionObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/SubmissionObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/cmpstr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/gsoap_job_server.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/job_server_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/test_history.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/CollectorObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/CollectorObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/GridObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/GridObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/JobServerObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/JobServerObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/JobUtils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/JobUtils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MasterObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MasterObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtCollectorPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtConversionMacros.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtMasterPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtNegotiatorPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtScheddPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtScheddPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtScheddPluginInstantiation.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtStartdPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/NegotiatorObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/NegotiatorObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/PROC_ID_comparator.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/PROC_ID_comparator.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/PoolUtils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/PoolUtils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SchedulerObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SchedulerObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SlotObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SlotObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SubmissionObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SubmissionObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SubmitterObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SubmitterObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SubmitterUtils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SubmitterUtils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/Utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/Utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSAccountant.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSAccountant.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSClassAdOps.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSDBNames.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSHistoryFile.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSHistoryFile.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSHistoryProcessors.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSHistoryProcessors.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSJobLogConsumer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSJobLogConsumer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSMongodbOps.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSMongodbOps.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSStatsProcessors.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSStatsProcessors.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSUtils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSUtils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/PlumageCollectorPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/plumage_history_load_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/plumage_job_daemon_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/TriggerConsole.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/TriggerConsole.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/TriggerObject.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/TriggerObject.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/Triggerd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/Triggerd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/simple_console.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/test_triggers.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/trigger_config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/triggerd_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/utils/broker_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_contrib/utils/broker_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_credd/credd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_credd/credd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/condor_daemon_client.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon_list.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon_list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon_types.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_annexd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_annexd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_collector.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_collector.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_credd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_credd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager_lease.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager_lease.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_master.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_master.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_message.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_message.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_shadow.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_shadow.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_startd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_startd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_startd.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_starter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_starter.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_starter.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_transfer_queue.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_transfer_queue.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_transferd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_transferd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/HookClient.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/HookClient.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/HookClientMgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/HookClientMgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_daemon_core.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock_base.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock_base.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock_file.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock_file.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock_implementation.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock_implementation.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_softkill.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_softkill.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_timer_manager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/datathread.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/gsoap_daemon_core.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/gsoap_daemon_core_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/mimetypes.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/mimetypes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/no_soap_core.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/self_draining_queue.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/self_draining_queue.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/self_monitor.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/self_monitor.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soapEnv.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_daemon_core.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_daemon_coreStub.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/timer_manager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/valgrind.h
Examining data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_dagman_metrics_reporter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dag.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dag.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_classad.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_classad.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_commands.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_commands.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_metrics.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_metrics.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_multi_dag.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_multi_dag.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_recursive_submit.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_recursive_submit.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_submit.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_util.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/debug.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/debug.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/jobstate_log.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/jobstate_log.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/BTree.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/BTree.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/ConstituentLibrary.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/ConstituentLibrary.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/DagInfo.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/DagInfo.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/DagmanDag.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/DagmanDag.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Event.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Graph.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Graph.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Resizable2DArray.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Resizable2DArray.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/ResizableArray.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/ResizableArray.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizerWithCont.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizerWithCont.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Superdag.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Superdag.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Trie.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Trie.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/global.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/global.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/parse.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/parse.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/script.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/script.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/scriptQ.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/scriptQ.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/submit.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/throttle_by_category.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/throttle_by_category.h
Examining data/condor-8.6.8~dfsg.1/src/condor_dagman/util.h
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/curl_plugin.c
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/data_plugin.c
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/dllmain.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hashwin32.h
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs.h
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.h
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs_plugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs_plugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs_plugin_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/stdint-msvc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/PipeBuffer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/PipeBuffer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/ftgahp_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/ftgahp_common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/basejob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/basejob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/baseresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/baseresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boinc-client.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boincjob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boincjob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boincresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boincresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamjob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamjob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2resource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2resource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gceresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gceresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/generic-gahp-client.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/proxymanager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/proxymanager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/transferrequest.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/transferrequest.h
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/unicore_gahp_wrapper.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/unicorejob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_gridmanager/unicorejob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/AbstractReplicatorStateMachine.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/AbstractReplicatorStateMachine.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/BaseReplicaTransferer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/BaseReplicaTransferer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/DownloadReplicaTransferer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/DownloadReplicaTransferer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/FilesOperations.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/FilesOperations.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/HAD.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/HAD_Version.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/Replication.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/ReplicatorState.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/ReplicatorStateMachine.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/ReplicatorStateMachine.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/Transferer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/UploadReplicaTransferer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/UploadReplicaTransferer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/Utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_had/Utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_had/Version.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/CryptKey.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/KeyCache.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/SafeMsg.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/_functional.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/_shared_ptr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/_unordered_map.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/authentication.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/backward_file_reader.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/basename.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/buffers.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/cedar_enums.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/classad_cron_job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_accountant.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_adtypes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_attributes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth_anonymous.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth_claim.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth_fs.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth_kerberos.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth_passwd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth_ssl.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth_sspi.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_auth_x509.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_blkng_full_disk_io.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_ckpt_mode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_classad.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_collector.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_commands.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_compress.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_config.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_constants.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_create_id.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_cron_job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_cron_job_io.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_cron_job_list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_cron_job_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_cron_job_mode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_cron_job_params.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_cron_param.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_crypt.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_crypt_3des.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_crypt_blowfish.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_debug.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_distribution.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_email.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_environ.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_error.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_error_codes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_file_info.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_access.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_assert.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_setjmp.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_sys_resource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_sys_stat.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_sys_time.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_sys_utsname.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_unistd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_ftp.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_getmnt.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_gssapi_openssl.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_header_features.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_hpux_64bit_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_io.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_ipv6.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_macros.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_md.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_mkstemp.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_mmap.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_netaddr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_netdb.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_network.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_nfs.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_old_shadow_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_perms.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_pers.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_pidenvid.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_qmgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_random_num.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_registration.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_secman.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_snutils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sockaddr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_socket_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sockfunc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_state.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_status.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_string.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_aix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_bsd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_formats.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_hpux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_nt.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_solaris.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_syscall_mode.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_system.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_transfer_request.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_uid.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_universe.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_update_style.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/condor_vm_universe_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/config.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/credential.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/dprintf_internal.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/escapes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/exit.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/fdpass.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/file_lock.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/file_table_interf.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/filename_tools.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/fileno.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/fs_util.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/gcc_diag.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/get_port_range.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/globus_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/internet.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/internet_obsolete.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/ipv6_addrinfo.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/ipv6_hostname.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/linebuffer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/match_prefix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/my_getopt.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/named_classad.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/named_classad_list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/nullfile.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/pool_allocator.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/printf_format.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/reli_sock.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/safe_sock.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/set_user_priv_from_ad.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/sig_install.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/sock.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/sockCache.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/sslutils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/startup.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/stat.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/strcasestr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/stream.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/strupr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/test.common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/test.config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/test.constants.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/test.debug.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/truncate.h
Examining data/condor-8.6.8~dfsg.1/src/condor_includes/util_lib_proto.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_buffers.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_buffers.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_io.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io/CryptKey.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/authentication.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/cedar.t.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/cedar_no_ckpt.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_anonymous.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_claim.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_fs.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_ssl.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_sspi.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_crypt.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_crypt_3des.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_crypt_blowfish.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_rw.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_rw.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/errno_num.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/fcntl_cmd.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/open_flags.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_scm_rights.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_server.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_server.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io/sig_num.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/sockCache.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_io/test.h
Examining data/condor-8.6.8~dfsg.1/src/condor_io/utilfns.h
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouter.h
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouterHookMgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouterHookMgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/NewClassAdJobLogConsumer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/NewClassAdJobLogConsumer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/RoutedJob.h
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/Scheduler.h
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/VanillaToGrid.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/VanillaToGrid.h
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/VanillaToGrid_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/job_router_info.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/schedd_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/schedd_v7_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/schedd_v7_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/submit_job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_job_router/submit_job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_kbdd/XInterface.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_kbdd/XInterface.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_kbdd/kbdd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_mail/AssemblyInfo.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_mail/condor_mail.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_mail/resource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_master.V6/ExampleMasterPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_master.V6/MasterPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_master.V6/MasterPluginManager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.h
Examining data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_master.V6/service.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/ExampleNegotiatorPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/NegotiatorPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/NegotiatorPluginManager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/accountant_log_fixer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker_negotiate.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker_negotiate.h
Examining data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/protocol-test.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_power/power.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_power/power_state.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_power/rooster.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_power/rooster.h
Examining data/condor-8.6.8~dfsg.1/src/condor_power/rooster_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_prio/prio.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/condor_privsep.h
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/parse_config.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/parse_config.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/privsep_client.UNIX.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/privsep_client.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/privsep_dc.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/privsep_fork_exec.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/privsep_fork_exec.h
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_privsep/switchboard.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_cpu_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_faminfo_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_fork_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_getproc_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_internal.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_killfamily.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_perm_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_pidfam_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_set_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_t.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/processid.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/processid.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procapi/testprocapi.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/cgroup_tracker.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/cgroup_tracker.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/dprintf_lite.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/environment_tracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/gid_pool.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/gid_pool.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/glexec_kill.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/glexec_kill.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/group_tracker.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/group_tracker.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/local_client.UNIX.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/local_client.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/local_client.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/local_client_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/local_server.UNIX.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/local_server.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/local_server.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/local_server_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/login_tracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/login_tracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_reader.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_reader.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_util.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_util.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_watchdog.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_watchdog.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_watchdog_server.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_watchdog_server.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_writer.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_writer.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/parent_tracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/parent_tracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/pid_tracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_client.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_client.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_io.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_io.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_member.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_member.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_monitor.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_monitor.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_server.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_server.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_tracker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_tracker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/procd_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/procd_common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/procd_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_procd/tracker_helper_list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_release/examples/dagman/half.c
Examining data/condor-8.6.8~dfsg.1/src/condor_release/examples/dagman/random.c
Examining data/condor-8.6.8~dfsg.1/src/condor_release/examples/dagman/sum.c
Examining data/condor-8.6.8~dfsg.1/src/condor_release/examples/env.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_release/examples/fstream.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_release/examples/io.c
Examining data/condor-8.6.8~dfsg.1/src/condor_release/examples/loop.c
Examining data/condor-8.6.8~dfsg.1/src/condor_release/examples/registers.c
Examining data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_rmdir/bprint.h
Examining data/condor-8.6.8~dfsg.1/src/condor_rmdir/common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.h
Examining data/condor-8.6.8~dfsg.1/src/condor_rmdir/harylist.h
Examining data/condor-8.6.8~dfsg.1/src/condor_rmdir/main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_rmdir/tokenize.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_rmdir/tokenize.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/ExampleClassAdLogPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/ExampleScheddPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/ScheddPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/ScheddPluginManager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/autocluster.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/autocluster.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/gsoap_schedd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/gsoap_schedd_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/history_helper.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/ickpt_share.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/ickpt_share.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/job_transforms.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/job_transforms.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/loose_file_transfer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/loose_file_transfer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/prio_rec.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt_constants.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt_receivers.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt_send_stubs.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgr_job_updater.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgr_job_updater.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgr_lib_support.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_api.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_api.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_cron_job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_cron_job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_cron_job_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_cron_job_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_files.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_files.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_negotiate.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_negotiate.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_stats.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_stats.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_td.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/scheduler.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/shadow_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/shadow_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/tdman.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/tdman.h
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/transfer_queue.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/transfer_queue.h
Examining data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/mpiresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/mpiresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/parallelshadow.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/parallelshadow.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/pseudo_ops.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/pseudo_ops.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/shadow.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/shadow.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/shadow_user_policy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/shadow_user_policy.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/shadow_v61_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/user_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/job_report.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/job_report.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/ops.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_shadow.std/structproc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_shared_port/shared_port_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_soapshell/gsoap_soapshell.h
Examining data/condor-8.6.8~dfsg.1/src/condor_soapshell/soap_soapshellStub.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_soapshell/soapshell_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/AvailStats.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/AvailStats.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/AvailStats.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/CondorSystrayCommon.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/CondorSystrayNotifier.windows.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/CondorSystrayNotifier.windows.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ExampleStartdPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/IdDispenser.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/IdDispenser.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/LoadQueue.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/LoadQueue.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Reqexp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Reqexp.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResAttributes.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResAttributes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResMgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResMgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResState.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResState.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Resource.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Resource.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/StartdHookMgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/StartdHookMgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/StartdPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/StartdPluginManager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Starter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Starter.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/VMMachine.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/VMMachine.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/VMManager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/VMManager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/VMRegister.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/VMRegister.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/backfill_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/backfill_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/boinc_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/boinc_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/claim.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/claim.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/cod_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/cod_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/command.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/command.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/glexec_starter.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/glexec_starter.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/glexec_wrapper.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/slot_builder.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/slot_builder.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_params.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_params.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_cron_job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_cron_job.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_cron_job_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_cron_job_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_cron_job_params.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_cron_job_params.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_hibernator.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_hibernator.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_named_classad.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_named_classad.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_named_classad_list.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_named_classad_list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/starter_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/starter_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/util.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/util.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/vm_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/vm_common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/vmuniverse_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/vmuniverse_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/XXX_startd_factory_attrs.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/condor_partition.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/condor_partition_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/condor_startd_factory.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/condor_workload.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/condor_workload_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/htc_boot_partition.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/htc_list_partitions.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/htc_tool.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/partition.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/partition_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/startd_factory.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/startd_factory_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/workload.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_startd_factory/workload_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/NTsenders.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/NTsenders.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/StarterHookMgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/StarterHookMgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/cgroup.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/cgroup.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/cgroup_limits.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/cgroup_limits.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_pid_ns_init.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_privsep_helper.UNIX.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_privsep_helper.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_privsep_helper.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_rsh.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/docker_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/docker_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/glexec_job_wrapper.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/glexec_privsep_helper.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/glexec_privsep_helper.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/java_detect.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/java_detect.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/java_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/java_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_file.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_file.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_schedd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_schedd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/job_info_communicator.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/job_info_communicator.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/local_user_log.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/local_user_log.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_master_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_master_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/os_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/os_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/privsep_helper.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/privsep_helper.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/script_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/script_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/singularity.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/singularity.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/sshd_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/sshd_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter_user_policy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter_user_policy.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter_v61_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/stream_handler.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/stream_handler.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/tool_daemon_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/tool_daemon_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_request.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_request.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/NON_POSIX.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/alarm.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/alarm.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/analyze_core.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/driver.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/name_tab.non_alpha.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/proto.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/signals.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/signals.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/state_machine_driver.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/state_machine_driver.h
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/tables.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_status.V6/setflags.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit_internal.h
Examining data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit_protocol.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/analyze_exec.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/clinpack.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/clinpack_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry.h
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry21a.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/free_fs_blocks.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/free_fs_blocks_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/kernel_memory_model.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/kernel_version.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/kflops_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/last_x_event.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/mips_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/net_dev_info.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/partition_id.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/phys_mem.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/phys_mem_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/processor_flags.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/reconfig.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/resource_limits.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/sysapi.h
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/sysapi.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/sysapi_externs.h
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.h
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/virt_mem.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/virt_mem_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_sysapi/vsyscall_gate_addr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/condor_glibc_versions.h
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/file_stream.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/getcwd.c
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/linux_kernel_stat.h
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_startup.c
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_syscall.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/special_stubs.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/syscall_64bit.h
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/syscall_connect.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/syscall_macros.h
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/syscall_param_sizes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/syscall_sysdep.h
Examining data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/xfer_file.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/appendmsg.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_combo-sanity_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_constructor_std.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_dup_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_env_std.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_floats-async_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_floats_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_getrusage-loop_std.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_gettimeofday_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_integers_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-async_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async-compressed_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_longjmp_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_memory-file_std.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_nscd_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_open-N-parallel_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_open-async-ckpt_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_signals_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_stack_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_standalone_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_core-cpp_exception_std.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_core-cpp_mem-alloc_std.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_bigenv.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_compressfiles.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_coredump.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_atexit_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_binary-io_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fcntl_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fgets_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fread_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fstream_std.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_ftell_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_getdirentries_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_open-N-serial_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_stat_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_true-false_std.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_truncate_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_zero-calloc_std.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/lib_eventlog_base.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/sleep.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/validate_job_queue.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_complete_params.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_conditional_params.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_dumpcore.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_fake_ckpt.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_fake_ckpt.h
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_killppid.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_raisesegfault.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_read_joblog.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_return-n.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_trapsig.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_waste_second.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_waste_second.h
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_write_joblog.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tests/x_write_joblog_events.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/advertise.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/ckpttest.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/condor_test_match.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/condor_urlfetch.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/config_val.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/convert_history.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/cuda_header_doc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/drain.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/fetch_log.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/invalidate_host.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/load_history.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/master_on.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/nvml_stub.h
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/opencl_header_doc.h
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/peek.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/preen.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/probe_process.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/qedit.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/return-n.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/soap_setupStub.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/sos.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/test_auth.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/test_calc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/transfer_data.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/update_machine_ad.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/version.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_tools/wait.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_transferd/condor_td.h
Examining data/condor-8.6.8~dfsg.1/src/condor_transferd/td_active.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_transferd/td_init.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_transferd/td_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_transferd/td_maint.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_transferd/td_read_files.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_transferd/td_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_transferd/td_write_files.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_basename.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_dirname.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_flatten_and_inline.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_fullpath.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_getHostFromAddr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_getPortFromAddr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_host_in_domain.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_is_valid_sinful.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_sin_to_hostname.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_sin_to_string.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_stl_string_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_string_to_port.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strlwr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strupr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_tokener.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_your_string.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_ArgList.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Directory.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Env.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_FileLock.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_HashTable.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Iso_Dates.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_StatInfo.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_StringList.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_TmpDir.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_UserPolicy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_condor_sockaddr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/consumption_policy_tests.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/emit.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/emit.h
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/function_test_driver.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/function_test_driver.h
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/ring_buffer_tests.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/test_daemon_core.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/unit_test_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/unit_test_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_unit_tests/unit_tests.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_userlog/condor_check_userlogs.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_userlog/condor_userlog_job_counter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogEntry.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogEntry.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogPlugin.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogPluginManager.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogProber.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogProber.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogReader.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogReader.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdReevaluator.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdReevaluator.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdReevaluatorTest.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/CondorError.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/CondorError.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/HashTable.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/HashTable.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/JobLogMirror.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/JobLogMirror.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/KeyCache.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ListCache.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/LoadPlugins.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/LoadPlugins.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/MapFile.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/MapFile.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/NegotiationUtils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/NegotiationUtils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/OrderedSet.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/PluginManager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/Queue.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/Queue.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/Regex.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/Regex.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/Set.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/SourceRoute.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/SourceRoute.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/Stack.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/X509credential.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/X509credential.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/access.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/access.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/access.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/access_desktop.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/access_desktop.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/access_euid.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/alarm.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/alarm.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/backward_file_reader.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/basename.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/binary_search.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/build_job_env.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/build_job_env.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/check_events.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/check_events.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/chomp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ckpt_server_api_stubs.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ckpt_util.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classadHistory.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classadHistory.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_collection.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_collection.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_command_util.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_command_util.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_cron_job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_hashtable.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_hashtable.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_helpers.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_helpers.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_merge.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_merge.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_oldnew.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_oldnew.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_usermap.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_visa.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classad_visa.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/classy_counted_ptr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/command_strings.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/command_strings.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad_list.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad_list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad_util.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad_util.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_adtypes.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_api.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_arglist.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_arglist.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_attributes.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_base64.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_base64.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_blkng_full_disk_io.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_claimid_parser.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_create_id.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_crontab.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_crontab.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_environ.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_fsync.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_fsync.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_ftp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_full_io.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_getcwd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_getcwd.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_holdcodes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_id.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_id.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_md.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_mkstemp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netaddr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_open.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_perms.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pers.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_q.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_q.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_query.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_query.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockfunc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockfunc_ex.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_state.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_timeslice.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_timeslice.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_universe.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_unsetenv.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_unsetenv.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_url.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_url.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_user_policy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_user_policy.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_ver_info.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_ver_info.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_version.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/condor_version.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/console-utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/console-utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/consumption_policy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/consumption_policy.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/copy_file.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/counted_ptr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/credential.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/credential.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_io.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_list.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_mode.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_params.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/cron_param.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/cronos.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/d_format_time.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/date_util.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/date_util.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dc_service.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dc_service.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/debug_timer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/debug_timer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/debug_timer_dprintf.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/detach.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/directory.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/directory.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/directory.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/directory.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/distribution.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/do_connect.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/domain_tools.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/domain_tools.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_setup.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_syslog.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_syslog.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/email_cpp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/email_file.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/enum_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/enum_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/env.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/env.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/error_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/error_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/escapes.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/event_handler.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/event_handler.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/except.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/exit_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/exponential_backoff.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/exponential_backoff.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/expr_analyze.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/expr_analyze.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/extArray.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/extra_param_info.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/extra_param_info.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/fdpass.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/fdpass_test.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer_db.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer_db.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_xml.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/file_xml.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools_cpp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/filesystem_remap.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/filesystem_remap.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/firewall.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/firewall.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/flock.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/forkwork.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/forkwork.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/fs_util.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/gahp_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/gahp_common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/generic_query.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/generic_query.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/get_daemon_name.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/get_daemon_name.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/get_last_error_string.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/get_port_range.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/get_random_num.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/getdtablesize.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/getmnt.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/getpagesize.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hashkey.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hashkey.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernation_manager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernation_manager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.tools.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.tools.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hook_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/hook_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ipv6_addrinfo.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ipv6_hostname.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ipv6_interface.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ipv6_interface.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/java_config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/java_config.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuedatabase.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/killfamily.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/killfamily.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/killfamily.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/libcondorapi_stubs.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/limit.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/limit.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/linebuffer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/link.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/link.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/load_dll.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/load_dll.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/lock_file.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/lock_file.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/log.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/log.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/log_transaction.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/log_transaction.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/mark_thread.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/match_prefix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/metric_units.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/metric_units.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/misc_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/misc_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/mkargv.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_distribution.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_getopt.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_hostname.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_hostname.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_hostname.t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_username.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/my_username.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/name_tab.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/name_tab.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/named_classad.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/named_classad_list.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/natural_cmp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/natural_cmp.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/net_string_list.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/net_string_list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/newclassad_stream.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/newclassad_stream.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ntsysinfo.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/ntsysinfo.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/nullfile.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/open_files_in_pid.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/open_files_in_pid.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/overflow.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/overflow.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/param_info.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/param_info.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/param_info_hash.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/param_info_help.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/passwd_cache.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/passwd_cache.unix.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/path_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/path_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/perm.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/pgsqldatabase.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/pgsqldatabase.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/posix.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/print_wrapped_text.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/print_wrapped_text.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/printf_format.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/prioritysimplelist.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/proc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/proc_family_direct.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/proc_family_direct.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/proc_family_interface.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/proc_family_interface.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/proc_family_proxy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/proc_family_proxy.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/proc_id.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/procd_config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/procd_config.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/process_control.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/process_control.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/profile.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/profile.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/query_result_type.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/quill_enums.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/read_multiple_logs.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/read_multiple_logs.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/remote_close.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/remote_close.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/rotate_file.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/scanner.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/secure_file.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/secure_file.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/security.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/security.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/selector.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/selector.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/set_user_priv_from_ad.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/setsyscalls.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/setup_api_dll.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/setup_api_dll.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sig_install.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sig_name.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sig_name.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/simple_arg.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/simple_arg.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/simplelist.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sinful-tool.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sleep.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/socket_proxy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/socket_proxy.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/spool_version.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/spool_version.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/spooled_job_files.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/spooled_job_files.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/startup_info.unix.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_access.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_func.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_info.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_info.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_struct.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_wrapper.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_wrapper.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_wrapper_internal.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stat_wrapper_internal.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/status_string.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/status_string.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/status_types.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stopwatch.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/str_isxxx.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/str_isxxx.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/strcasestr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stringSpace.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/stringSpace.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/string_conversion.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/string_conversion.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/strnewp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/strupr.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/submit_glob.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/subsystem_info.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/subsystem_info.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/systemd_manager.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/systemd_manager.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_afs.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_binarysearch.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_check_events.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_merge.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_compat_classad.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_condor_crontab.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_get_exec_path.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_hibernation.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_libcondorapi.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_macro_expand.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_mapfile.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_multi_log.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_network_adapter.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_open_files.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_prioritysimplelist.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_queue.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_simplelist.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_sinful.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_spawn.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_stat_wrapper.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_stringSpace.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_subproc.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_tree.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_uids.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_mapping.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/test_write_term.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/testingd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/threads_implementation.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/time_offset.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/time_offset.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/timed_queue.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/tmp_dir.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/tmp_dir.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/token_cache.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/token_cache.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/tokener.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/tokener.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/totals.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/transfer_request.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/translation_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/translation_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/tree.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/truncate.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/uids.windows.credd.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/update_rusage.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/usagemon.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/usagemon.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user32_api_dll.dead.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user32_api_dll.dead.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user_error_policy.dead.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user_error_policy.dead.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user_log.c++.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user_log_header.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/user_log_header.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/userlog_to_classads.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/userlog_to_classads.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/utc_time.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/utc_time.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/uuid_lib.WINDOWS.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/vm_univ_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/vm_univ_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/waker.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/waker.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/which.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/which.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/write_user_log.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/write_user_log.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/write_user_log_state.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/write_user_log_state.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.h
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/zkm_base64.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_utils/zkm_base64.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/myvmrun_t.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/pbuffer.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/pbuffer.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vm_request.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vm_request.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vm_type.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vm_type.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_config.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_config.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_error_codes.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.h
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/xen_type.linux.cpp
Examining data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/xen_type.linux.h
Examining data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp
Examining data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp
Examining data/condor-8.6.8~dfsg.1/src/defrag/defrag.cpp
Examining data/condor-8.6.8~dfsg.1/src/defrag/defrag.h
Examining data/condor-8.6.8~dfsg.1/src/defrag/defrag_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/defrag/defrag_stats.cpp
Examining data/condor-8.6.8~dfsg.1/src/defrag/defrag_stats.h
Examining data/condor-8.6.8~dfsg.1/src/deployment_tools/uniq_pid_tool_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/PipeBuffer.h
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/PipeBuffer_no_dc.cpp
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.h
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazon_io_checkfn.cpp
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.h
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.h
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/queryAPI-sim.cpp
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/request.cpp
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/request.h
Examining data/condor-8.6.8~dfsg.1/src/ec2_gahp/thread_control.h
Examining data/condor-8.6.8~dfsg.1/src/gangliad/ganglia_interaction.cpp
Examining data/condor-8.6.8~dfsg.1/src/gangliad/ganglia_interaction.h
Examining data/condor-8.6.8~dfsg.1/src/gangliad/gangliad.cpp
Examining data/condor-8.6.8~dfsg.1/src/gangliad/gangliad.h
Examining data/condor-8.6.8~dfsg.1/src/gangliad/gangliad_main.cpp
Examining data/condor-8.6.8~dfsg.1/src/gangliad/statsd.cpp
Examining data/condor-8.6.8~dfsg.1/src/gangliad/statsd.h
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/PipeBuffer.cpp
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/PipeBuffer.h
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.h
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/gce_io_checkfn.cpp
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.h
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/io_loop_pthread.cpp
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/io_loop_pthread.h
Examining data/condor-8.6.8~dfsg.1/src/gce_gahp/thread_control.h
Examining data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp
Examining data/condor-8.6.8~dfsg.1/src/gt2_gahp/internal.h
Examining data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp
Examining data/condor-8.6.8~dfsg.1/src/h/condor_sys.h
Examining data/condor-8.6.8~dfsg.1/src/h/syscall.aix.h
Examining data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c
Examining data/condor-8.6.8~dfsg.1/src/pandad/PipeBuffer.cpp
Examining data/condor-8.6.8~dfsg.1/src/pandad/PipeBuffer.h
Examining data/condor-8.6.8~dfsg.1/src/pandad/Queue.h
Examining data/condor-8.6.8~dfsg.1/src/pandad/TimeSensitiveQueue.cpp
Examining data/condor-8.6.8~dfsg.1/src/pandad/TimeSensitiveQueue.h
Examining data/condor-8.6.8~dfsg.1/src/pandad/main.cpp
Examining data/condor-8.6.8~dfsg.1/src/pandad/pandadClassAdLogPlugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/bulk_query_iterator.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/claim.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/classad.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/classad_expr_return_policy.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/classad_module.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/classad_parsers.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/classad_parsers.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/classad_python_user.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/classad_wrapper.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/collector.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/collector_plugin.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/config.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/daemon_and_ad_types.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/dc_tool.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/enable_deprecation_warnings.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/event.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/event.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/export_compat_classad.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/export_headers.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/exprtree_wrapper.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/htcondor.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/inotify_sentry.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/log_reader.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/log_reader.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/module_lock.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/module_lock.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/negotiator.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/old_boost.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/python_bindings_common.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/query_iterator.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/schedd.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/secman.cpp
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/secman.h
Examining data/condor-8.6.8~dfsg.1/src/python-bindings/startd.cpp
Examining data/condor-8.6.8~dfsg.1/src/safefile/safe_fopen.c
Examining data/condor-8.6.8~dfsg.1/src/safefile/safe_fopen.h
Examining data/condor-8.6.8~dfsg.1/src/safefile/safe_id_range_list.c
Examining data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c
Examining data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.h
Examining data/condor-8.6.8~dfsg.1/src/safefile/safe_open.c
Examining data/condor-8.6.8~dfsg.1/src/safefile/safe_open.h
Examining data/condor-8.6.8~dfsg.1/debian/dmtcp/foo.c

FINAL RESULTS:

data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:976:13:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
							rc = readlink( proxy.c_str(), target, LINK_BUFSIZE );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/proxymanager.cpp:894:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		chmod (myProxyEntry->get_delegation_err_filename, 0600);
data/condor-8.6.8~dfsg.1/src/condor_io/cedar_no_ckpt.cpp:605:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	result = ::chmod( destination, (mode_t)file_mode );
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:723:28:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
			ssize_t procExeLength = readlink( procExePath.c_str(), procExe, 1024 );
data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouter.cpp:1751:18:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		int chown_rc = chown(proxy_file_copy.c_str(),dst_uid,dst_gid);
data/condor-8.6.8~dfsg.1/src/condor_privsep/switchboard.unix.cpp:44:16:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
#define lchown chown
data/condor-8.6.8~dfsg.1/src/condor_privsep/switchboard.unix.cpp:850:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    r = chown(dir_name, uid, gid);
data/condor-8.6.8~dfsg.1/src/condor_procd/local_server.UNIX.cpp:120:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		if (chown(m_reader->get_path(), client_uid, (gid_t)-1) == -1) {
data/condor-8.6.8~dfsg.1/src/condor_procd/local_server.UNIX.cpp:127:7:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		if (chown(m_watchdog_server->get_path(), client_uid, (gid_t)-1) == -1) {
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:415:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
   SetSecurityDescriptorDacl (&si,  TRUE, NULL, FALSE);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:415:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
   SetSecurityDescriptorDacl (&si,  TRUE, NULL, FALSE);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:5170:16:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	IGNORE_RETURN chmod(path,00755);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:9445:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if( chmod(dir_name.Value(), (mode|desired_mode)) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1744:10:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		rval = readlink(path, lbuffer, length);
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1860:10:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
		rval = chown(path, uid, gid);
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:2062:10:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		rval = chmod(path, mode);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/util.cpp:165:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (chmod(exec_path, new_mode) < 0) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1844:8:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
			if (chown(WorkingDir.Value(),
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2384:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
			if (chmod(CONDOR_EXEC, 0755) == -1) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/os_proc.cpp:149:16:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		int retval = chmod( JobName.Value(), S_IRWXU | S_IRWXO | S_IRWXG );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/script_proc.cpp:98:16:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		int retval = chmod( exe_path.Value(), 0755 );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/tool_daemon_proc.cpp:98:16:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		int retval = chmod( DaemonName, S_IRWXU | S_IRWXO | S_IRWXG );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:435:32:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
                           if (chown(full_dir_str.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_proc.cpp:364:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if ( chmod( Starter->GetWorkingDir(), 0755 ) == -1 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.std/driver.cpp:59:9:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
	while( gets(buf) ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1452:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (chmod(local_dir_path.Value(), LOCAL_DIR_MODE) == -1) {
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:212:15:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
			if( (count=readlink(path,maps_to,sizeof(maps_to)) - 1) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:143:12:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
REMAP_TWO( chmod, __chmod, int , const char *, mode_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:144:14:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
REMAP_THREE( chown, __chown, int , const char *, uid_t , gid_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:189:14:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
REMAP_THREE( readlink, __readlink, ssize_t , const char *, char *, size_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:191:14:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
REMAP_THREE( readlink, __readlink, int , const char *, char *, size_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:436:9:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
	return gets(buf);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:518:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	return readlink(path, buf, len);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:532:28:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	passed = handle_zng(ret = chmod(file, mode));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:572:28:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	passed = handle_zng(ret = chown(file, owner, group));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:2308:28:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	passed = handle_gez(ret = readlink(path, buf, bufsiz));
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_StatInfo.cpp:302:16:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	cut_assert_z( chmod("executable_file", 0755) );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory.cpp:712:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	chmod_rval = chmod( GetDirectoryPath(), mode );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory.cpp:1204:6:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	if( chown(path, dst_uid, dst_gid) != 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1037:11:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
						if (chown( dirpath, get_condor_uid(),
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1816:4:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
			chmod( it->logPath.c_str(), 0644);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2307:10:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
				if ( chmod( fullname.Value(), stat_buf.st_mode ) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2313:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
			if ( chmod( fullname.Value(), 0755 ) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:79:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	rval = readlink( "/proc/self/exe", path_buf, MAXPATHLEN );
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:240:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	rval = readlink( "/proc/curproc/file", path_buf, MAXPATHLEN );
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:616:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
   SetSecurityDescriptorDacl (&si,  TRUE, NULL, FALSE);
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:616:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
   SetSecurityDescriptorDacl (&si,  TRUE, NULL, FALSE);
data/condor-8.6.8~dfsg.1/src/condor_utils/selector.cpp:155:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  end = readlink(proc_buf, link_buf, LINK_BUFSIZE);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:539:18:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
			IGNORE_RETURN chmod(tmp_file, VMWARE_VMDK_FILE_PERM);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:714:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	int retval = chmod(vmconfig, VMWARE_VMX_FILE_PERM);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:1837:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	int retval = chmod(tmp_config_name.Value(), VMWARE_VMX_FILE_PERM);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/xen_type.linux.cpp:533:11:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
	result = chown( tmpfilename.Value(), get_user_uid(), get_user_gid() );
data/condor-8.6.8~dfsg.1/src/python-bindings/event.cpp:36:28:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    if (-1 == (link_size = readlink(proc_fname.c_str(), &linkname[0], 1023)))
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:754:21:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	    readlink_len = readlink(path, link_path, link_path_len + 1);
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:1290:21:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	    readlink_len = readlink(path, link_path, link_path_len + 1);
data/condor-8.6.8~dfsg.1/src/classad/classad/common.h:93:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/condor-8.6.8~dfsg.1/src/classad/classad/common.h:93:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/condor-8.6.8~dfsg.1/src/classad/debug.cpp:39:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, arguments);
data/condor-8.6.8~dfsg.1/src/classad/extra_tests.cpp:249:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system("rm -f tmp.classads.tmp");
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:1303:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		if( sprintf( buffer, "%d %s %d", dd, month.c_str( ), yy ) > 63 ||
data/condor-8.6.8~dfsg.1/src/classad/optester.cpp:58:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (buffer,"%s %s", Operation::opString[op],values[type1]);
data/condor-8.6.8~dfsg.1/src/classad/optester.cpp:80:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf (buffer,"( %s )", values[type1]);
data/condor-8.6.8~dfsg.1/src/classad/optester.cpp:106:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf (buffer, "%s ? %s : %s", values[type1], 
data/condor-8.6.8~dfsg.1/src/classad/optester.cpp:132:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf (buffer, "%s %s %s", values[type1], 
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:125:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(kvpbuf, "\"%s@submit.chtc.wisc.edu\"", users[user-1]);
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:511:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( formatted, "    %-34s%-20s%s\n", "Condition",
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:514:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( formatted, "    %-34s%-20s%s\n", "---------",
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:539:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( suggest, "MODIFY TO %s", value );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:548:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( formatted, "%-4i%-34s%-20s%s\n", i, cond, info,
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:551:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( formatted, "%-4i%s\n%38s%-20s%s\n", i, cond, "", info,
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:646:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( formatted, "%-24s%s\n", "Attribute", "Suggestion" );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:648:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( formatted, "%-24s%s\n", "---------", "----------" );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:698:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( formatted, "%-24s%s\n", attr, suggest );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:824:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( formatted, "    %-25s%s\n", cond, value );
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:243:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tempString, "%s=%i;", attrs[i].c_str( ), rand( ) );
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:251:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tempString, "(other.%s%s%i)",
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:116:3:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		scanf( "%s", cmdString );
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:122:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s", buffer1 );
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:162:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s", buffer1 );
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:183:9:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				if( scanf( "%s", buffer1 ) != 1 ) {
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:188:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s", buffer2 );
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:224:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s", buffer1 );
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:236:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s", buffer1 );
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:246:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s %s %s %s %s", buffer1, buffer2, constraint, rank, 
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:264:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s %s %s %s %s %s", buffer1, buffer2, constraint, rank, 
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:285:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s", buffer1 );
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:296:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				scanf( "%s", buffer1 );
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:177:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				int err = system("condor on");
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:183:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				int err = system("condor off");
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:189:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				int err = system("condor_vacate");
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:250:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fields = fscanf(file,"%s %d %s",host,&port,cookie);
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:111:14:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fields = fscanf(file,"%s %d %s",host,&port,cookie);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:61:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf( &text[strlen(text)], format, args );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:73:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf( &text[strlen(text)], format, args );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:126:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(text,"Warning: %s: ",table[kind].name);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:129:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf( &text[strlen(text)], format, args );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:204:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buffer,table[i].name);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:218:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buffer,mode_names[i]);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:111:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(local_url,"local:%s",local_filename);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/eprintf.c:38:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   fprintf (stderr, string, expression, line, filename);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:395:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(*url,"local:%s",logical_name);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:417:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(*url,"buffer:remote:%s",logical_name);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:552:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(new_url,"buffer:remote:%s",path);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:662:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(*full_path,working_dir);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:664:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(*full_path,short_path);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:1088:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( working_dir, path );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:424:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( name, n );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:524:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( file_name, ckpt_name );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:1183:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tmp_name, "%s.tmp", ckpt_file );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:2293:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stdout, fmt, args);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:70:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(seg->path, wspc);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:96:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(pathname, "%s%s", LOCAL_DRIVE_PREFIX, inet_ntoa(machine_IP));
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:149:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(pathname, "%s%s/%s", LOCAL_DRIVE_PREFIX, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:425:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX, machine_name, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:491:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(pathname, "%s%s/%s", LOCAL_DRIVE_PREFIX, machine_name, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:526:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(pathname, "%s%s", LOCAL_DRIVE_PREFIX, machine_name);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:133:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(r_ptr->data.file_name, new_file_name);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:274:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(pathname1, "%s%s", LOCAL_DRIVE_PREFIX, FILE_INFO_FILENAME);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:275:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(pathname2, "%s%s", LOCAL_DRIVE_PREFIX, TEMP_FILE_INFO_FILENAME);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.cpp:48:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.cpp:82:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(old_pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.cpp:84:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(new_pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/replication.cpp:43:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(_owner_name, o);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/replication.cpp:50:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(_file, f);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:281:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Store Request Port:                ", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:284:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Store Request Socket Descriptor:   ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:290:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "%s%s", "Store Request Buffer Size:         ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:293:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "%s%d", "Store Request Buffer Size:         ", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:296:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Restore Request Port:              ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:299:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Restore Request Socket Descriptor: ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:305:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "%s%s", "Restore Request Buffer Size:       ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:308:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "%s%d", "Restore Request Buffer Size:       ", buf_size);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:310:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Service Request Port:              " ,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:313:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Service Request Socket Descriptor: ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:319:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "%s%s", "Service Request Buffer Size:       ", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:322:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "%s%d", "Service Request Buffer Size:       ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:329:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Total allowable transfers:         ", max_xfers);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:331:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Number of storing transfers:       ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:334:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d", "Number of restoring transfers:     ",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:607:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(log_msg, "%s%s", "Receiving SERVICE request from ", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:611:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(log_msg, "%s%s", "Receiving STORE request from ", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:615:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(log_msg, "%s%s", "Receiving RESTORE request from ", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:619:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(log_msg, "%s%s", "Receiving REPLICATE request from ", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:628:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "%s%d%s", "Using descriptor ", new_req_sd, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:760:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Request for service from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:785:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(log_msg, "Service: Unknown service requested from %s. "
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:793:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "Owner:   %s", service_req.owner_name);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:795:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "File:    %s", service_req.file_name);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:867:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(log_msg, "Service request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:882:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(log_msg, "Service request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:925:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  		sprintf(log_msg, "STATUS service address: %s:%d", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1030:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1034:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(log_msg, "Checking existance of file: %s",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1057:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Service request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1131:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Scheduling Replication: Prio=%d, Serv=%s, File=%s",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1158:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Replicating: Prio=%d, Serv=%s, File=%s",
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1161:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1180:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(req.owner, e->Owner());
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1182:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(req.filename, "%s.rep", e->File());
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1297:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(s_req.owner_name, e->Owner());
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1298:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(s_req.file_name, "%s.rep", e->File());
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1299:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(s_req.new_file_name, "%s", e->File());
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1398:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Store request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1414:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Store request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1423:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "Owner:     %s", store_req.owner);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1425:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "File name: %s", store_req.filename);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1490:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Store request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1505:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Store request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1544:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "STORE service address: %s:%d", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1550:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Store request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1603:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1627:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "Receiving checkpoint to file: %s", pathname);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1716:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Restore request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1734:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Restore request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1743:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "Owner:     %s", restore_req.owner);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1745:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "File name: %s", restore_req.filename);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1801:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX, inet_ntoa(shadow_IP),
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1811:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(log_msg, "Restore request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1831:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		  sprintf(log_msg, "Restore request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1848:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		  sprintf(log_msg, "Restore request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1879:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(log_msg, "RESTORE service address: %s:%d", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1886:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		  sprintf(log_msg, "Restore request from %s DENIED:", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1932:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(log_msg, "Transmitting checkpoint file: %s", pathname);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2062:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(pathname, "%s%s/%s/%s", LOCAL_DRIVE_PREFIX,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:140:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(line, "%s = \"%s\"", ATTR_NAME, get_local_fqdn().Value());
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:142:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(line, "%s = \"%s\"", ATTR_MACHINE, hostaddr );
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:144:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(line, "%s = \"%s\"", ATTR_VERSION, CondorVersion() );
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:146:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(line, "%s = \"%s\"", ATTR_PLATFORM, CondorPlatform() );
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:169:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(line, "CkptServerIntervalStart = \"%s\"", str ? str : "Unknown\n");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:181:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(line, "CkptServerIntervalEnd = \"%s\"", str ? str : "Unknown\n");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:220:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(peer_IP, inet_ntoa(peer));
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector.cpp:1270:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buffer, "Collector (%s):  Monthly report",
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector.cpp:1945:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( line, "%s%s = %d", label, name, getValue( univ ) );
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector.cpp:1949:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( line, "%s%s = %d", label, "All", count );
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:420:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(OutLinePtr,"%s\n",Arg.Value());
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:519:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(OutLinePtr,"%.2f%s",OutTime*100,tmp+1);
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:668:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(Line,"%d %s",&t,tmp)!=2) return -1;
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:681:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(Line,"%d %s",&t,tmp)!=2) return -1;
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:746:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(OutLine,DataFormat[i].Value(),TimeStamp,Key.Value(),GenRec->Data[0],GenRec->Data[1],GenRec->Data[2],GenRec->Data[3],GenRec->Data[4],GenRec->Data[5],GenRec->Data[6], GenRec->Data[7], GenRec->Data[8]);
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:831:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(Name,Machine);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeRequest.cpp:481:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeRequest.cpp:486:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeRequest.cpp:540:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%snames>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeRequest.cpp:546:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%snames>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeResponse.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeResponse.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeResponse.cpp:537:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeResponse.cpp:542:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeResponse.cpp:597:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sad",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_AttributeResponse.cpp:602:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sad>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetAttributes.cpp:437:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetAttributes.cpp:479:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetAttributes.cpp:485:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetAttributesResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetAttributesResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetCollector.cpp:553:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetCollector.cpp:571:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetCollector.cpp:611:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetCollector.cpp:617:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetCollectorResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetCollectorResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMaster.cpp:553:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMaster.cpp:571:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMaster.cpp:611:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMaster.cpp:617:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp:496:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssize>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp:501:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssize>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp:506:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_1, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Size);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp:552:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp:557:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp:612:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%soffset",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp:617:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%soffset>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterIDResponse.cpp:467:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterIDResponse.cpp:473:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterIDResponse.cpp:550:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sremaining>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterIDResponse.cpp:555:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sremaining>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterIDResponse.cpp:560:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_2, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Remaining);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetNegotiator.cpp:553:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetNegotiator.cpp:571:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetNegotiator.cpp:611:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetNegotiator.cpp:617:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetNegotiatorResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetNegotiatorResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetScheduler.cpp:553:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetScheduler.cpp:571:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetScheduler.cpp:611:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetScheduler.cpp:617:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSchedulerResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSchedulerResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlot.cpp:616:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlot.cpp:634:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlot.cpp:652:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlot.cpp:692:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlot.cpp:698:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp:496:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssize>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp:501:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssize>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp:506:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_1, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Size);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp:552:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp:557:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp:612:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%soffset",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp:617:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%soffset>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotIDResponse.cpp:467:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotIDResponse.cpp:473:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotIDResponse.cpp:550:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sremaining>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotIDResponse.cpp:555:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sremaining>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotIDResponse.cpp:560:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_2, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Remaining);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSubmitter.cpp:553:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSubmitter.cpp:571:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSubmitter.cpp:611:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSubmitter.cpp:617:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSubmitterResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSubmitterResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp:719:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sname>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp:724:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sname>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp:785:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%stype",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp:790:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%stype>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp:846:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%svalue>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp:851:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%svalue>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp:912:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdesc>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attribute.cpp:917:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdesc>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attributes.cpp:341:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sattrs",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Attributes.cpp:347:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sattrs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Collector.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Collector.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Collector.cpp:537:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Collector.cpp:542:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Collector.cpp:597:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssummary",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Collector.cpp:602:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssummary>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:748:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%srunning_jobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:753:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%srunning_jobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:758:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_1, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Running_jobs);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:805:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sidle_jobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:810:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sidle_jobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:815:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_2, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Idle_jobs);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:862:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%stotal_hosts>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:867:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%stotal_hosts>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:872:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_3, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Total_hosts);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:919:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sclaimed_hosts>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:924:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sclaimed_hosts>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:929:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_4, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Claimed_hosts);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:976:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sunclaimed_hosts>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:981:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sunclaimed_hosts>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:986:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_5, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Unclaimed_hosts);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:1033:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sowner_hosts>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:1038:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sowner_hosts>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:1043:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_6, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Owner_hosts);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobConstraint.cpp:445:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%stype",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobConstraint.cpp:450:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%stype>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobConstraint.cpp:506:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%svalue>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobConstraint.cpp:511:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%svalue>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobData.cpp:392:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobData.cpp:397:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobData.cpp:453:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%stype",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobData.cpp:458:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%stype>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobDetails.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobDetails.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobDetails.cpp:537:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobDetails.cpp:542:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobDetails.cpp:597:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdetails",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobDetails.cpp:602:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdetails>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp:708:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sjob>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp:713:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sjob>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp:774:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%spool>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp:779:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%spool>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp:840:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sscheduler>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp:845:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sscheduler>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp:906:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssubmission",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobID.cpp:911:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssubmission>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobStatus.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobStatus.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobStatus.cpp:537:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobStatus.cpp:542:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobStatus.cpp:597:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sjob_status",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobStatus.cpp:602:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sjob_status>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1542:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1547:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1603:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1608:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1664:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%squeued>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1669:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%squeued>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1721:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%slast_update>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1726:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%slast_update>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1778:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sjob_status",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1783:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sjob_status>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1839:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%scmd>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1844:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%scmd>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1905:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sargs1>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1910:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sargs1>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1971:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sargs2>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:1976:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sargs2>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:2037:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sheld>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:2042:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sheld>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:2103:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sreleased>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:2108:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sreleased>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:2169:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sremoved>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_JobSummary.cpp:2174:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sremoved>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Master.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Master.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Master.cpp:537:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Master.cpp:542:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Master.cpp:597:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssummary",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Master.cpp:602:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssummary>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp:483:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sarch",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp:488:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sarch>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp:544:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sos",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp:549:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sos>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp:605:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sreal_uid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp:610:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sreal_uid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp:615:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_3, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Real_uid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Negotiator.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Negotiator.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Negotiator.cpp:537:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Negotiator.cpp:542:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Negotiator.cpp:597:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssummary",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Negotiator.cpp:602:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssummary>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1314:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%slatest_cycle>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1319:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%slatest_cycle>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1371:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smatch_rate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1376:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smatch_rate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1428:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smatches>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1433:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smatches>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1438:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_3, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Matches);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1485:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sduration>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1490:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sduration>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1495:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_4, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Duration);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1542:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sschedulers>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1547:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sschedulers>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1552:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_5, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Schedulers);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1599:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sactive_submitters>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1604:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sactive_submitters>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1609:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_6, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Active_submitters);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1656:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sidle_jobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1661:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sidle_jobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1666:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_7, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Idle_jobs);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1713:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sjobs_considered>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1718:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sjobs_considered>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1723:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_8, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Jobs_considered);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1770:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%srejections>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1775:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%srejections>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1780:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_9, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Rejections);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1827:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%stotal_slots>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1832:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%stotal_slots>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1837:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_10, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Total_slots);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1884:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%scandidate_slots>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1889:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%scandidate_slots>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1894:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_11, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Candidate_slots);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1941:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%strimmed_slots>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1946:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%strimmed_slots>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1951:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_12, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Trimmed_slots);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceConstraint.cpp:445:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%stype",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceConstraint.cpp:450:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%stype>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceConstraint.cpp:506:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%svalue>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceConstraint.cpp:511:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%svalue>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:925:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresource",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:930:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sresource>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:985:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%spool>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:990:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%spool>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1051:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sname>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1056:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sname>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1117:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%saddress>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1122:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%saddress>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1183:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssub_type>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1188:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssub_type>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1249:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sbirthdate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1254:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sbirthdate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:1259:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_6, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Birthdate);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceLocation.cpp:428:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceLocation.cpp:433:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceLocation.cpp:487:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%slocation>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceLocation.cpp:493:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%slocation>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Scheduler.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Scheduler.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Scheduler.cpp:537:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Scheduler.cpp:542:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Scheduler.cpp:597:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssummary",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Scheduler.cpp:602:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssummary>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:950:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%squeue_created>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:955:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%squeue_created>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1007:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smax_jobs_running>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1012:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smax_jobs_running>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1017:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_2, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Max_jobs_running);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1064:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%susers>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1069:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%susers>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1074:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_3, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Users);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1121:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sads>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1126:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sads>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1131:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_4, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Ads);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1178:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%srunning>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1183:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%srunning>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1188:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_5, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Running);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1235:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sheld>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1240:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sheld>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1245:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_6, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Held);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1292:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sidle>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1297:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sidle>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1302:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_7, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Idle);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1349:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sremoved>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1354:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sremoved>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:1359:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_8, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Removed);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:691:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:696:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:752:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:757:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:812:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sslot_type",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:817:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sslot_type>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:872:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssummary",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:877:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssummary>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:932:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdynamic_slots",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Slot.cpp:938:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sdynamic_slots>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1530:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sarch",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1535:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sarch>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1591:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sos",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1596:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sos>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1652:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sactivity>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1657:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sactivity>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1719:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1724:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1786:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%scpus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1791:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%scpus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1796:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_5, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Cpus);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1843:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdisk>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1848:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdisk>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1853:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_6, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Disk);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1900:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smemory>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1905:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smemory>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1910:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_7, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Memory);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1957:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sswap>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1962:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sswap>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1967:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_8, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Swap);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2014:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smips>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2019:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smips>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2024:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_9, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Mips);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2071:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sload_avg>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2076:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sload_avg>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2128:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstart>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2133:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstart>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2195:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdomain>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2200:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdomain>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Status.cpp:434:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%scode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Status.cpp:439:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%scode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Status.cpp:494:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%stext>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Status.cpp:499:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%stext>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:662:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(text_value, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:678:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(text_value, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:723:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sname>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:728:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sname>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:789:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:794:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:855:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sqdate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:860:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sqdate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:865:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_3, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Qdate);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1160:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1165:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1221:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1226:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1282:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%scompleted>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1287:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%scompleted>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1292:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_3, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Completed);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1339:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sheld>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1344:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sheld>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1349:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_4, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Held);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1396:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sidle>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1401:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sidle>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1406:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_5, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Idle);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1453:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sremoved>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1458:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sremoved>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1463:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_6, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Removed);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1510:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%srunning>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1515:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%srunning>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1520:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_7, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Running);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1567:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssuspended>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1572:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssuspended>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1577:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_8, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Suspended);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1624:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%stransferring_output>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1629:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%stransferring_output>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1634:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_9, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Transferring_output);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1680:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sjobs",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:1686:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sjobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Submitter.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Submitter.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Submitter.cpp:537:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Submitter.cpp:542:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Submitter.cpp:597:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssummary",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_Submitter.cpp:602:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssummary>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterID.cpp:612:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sname>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterID.cpp:617:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sname>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterID.cpp:678:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smachine>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterID.cpp:683:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smachine>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterID.cpp:744:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sscheduler>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterID.cpp:749:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sscheduler>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:734:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%srunning>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:739:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%srunning>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:744:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_1, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Running);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:791:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sheld>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:796:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sheld>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:801:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_2, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Held);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:848:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sidle>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:853:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sidle>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:858:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_3, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Idle);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:905:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%screated>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:910:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%screated>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:962:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:967:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetDataNode.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sGetDataNode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetDataNode.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sGetDataNode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetDataNodeResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sGetDataNodeResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetDataNodeResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sGetDataNodeResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetJobTracker.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sGetJobTracker",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetJobTracker.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sGetJobTracker>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetJobTrackerResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sGetJobTrackerResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetJobTrackerResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sGetJobTrackerResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetNameNode.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sGetNameNode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetNameNode.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sGetNameNode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetNameNodeResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sGetNameNodeResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetNameNodeResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sGetNameNodeResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetTaskTracker.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sGetTaskTracker",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetTaskTracker.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sGetTaskTracker>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetTaskTrackerResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sGetTaskTrackerResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetTaskTrackerResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sGetTaskTrackerResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopID.cpp:612:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopID.cpp:617:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopID.cpp:678:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sipc>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopID.cpp:683:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sipc>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopID.cpp:744:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%shttp>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopID.cpp:749:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%shttp>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp:696:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sbin_file>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp:701:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sbin_file>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp:762:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp:767:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp:828:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdescription>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp:833:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdescription>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp:894:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sunmanaged",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopNameNodeStart.cpp:899:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sunmanaged>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQuery.cpp:341:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%srefs",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQuery.cpp:347:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%srefs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResponse.cpp:436:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResponse.cpp:442:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResponse.cpp:519:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResponse.cpp:524:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1208:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sref",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1213:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sref>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1269:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sparent",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1274:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sparent>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1330:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1335:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1397:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdescription>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1402:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdescription>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1464:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssubmitted>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1469:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssubmitted>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1474:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_5, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Submitted);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1521:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%suptime>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1526:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%suptime>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1531:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_6, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Uptime);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1578:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstate",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1583:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstate>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1639:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1644:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1700:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sbin_file>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:1705:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sbin_file>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:788:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sref",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:793:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sref>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:848:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sbin_file>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:853:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sbin_file>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:914:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:919:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:980:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdescription>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:985:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdescription>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:1046:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%scount>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:1051:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%scount>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:1056:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_5, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Count);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStartResponse.cpp:380:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sref",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStartResponse.cpp:385:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sref>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStartResponse.cpp:441:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStartResponse.cpp:446:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStop.cpp:341:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%srefs",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStop.cpp:347:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%srefs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResponse.cpp:436:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresults",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResponse.cpp:442:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresults>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResponse.cpp:519:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResponse.cpp:524:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResult.cpp:380:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sref",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResult.cpp:385:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sref>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResult.cpp:441:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStopResult.cpp:446:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartDataNode.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStartDataNode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartDataNode.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStartDataNode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartDataNodeResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStartDataNodeResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartDataNodeResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStartDataNodeResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartJobTracker.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStartJobTracker",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartJobTracker.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStartJobTracker>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartJobTrackerResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStartJobTrackerResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartJobTrackerResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStartJobTrackerResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartNameNode.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStartNameNode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartNameNode.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStartNameNode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartNameNodeResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStartNameNodeResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartNameNodeResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStartNameNodeResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartTaskTracker.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStartTaskTracker",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartTaskTracker.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStartTaskTracker>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartTaskTrackerResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStartTaskTrackerResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartTaskTrackerResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStartTaskTrackerResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopDataNode.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStopDataNode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopDataNode.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStopDataNode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopDataNodeResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStopDataNodeResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopDataNodeResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStopDataNodeResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopJobTracker.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStopJobTracker",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopJobTracker.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStopJobTracker>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopJobTrackerResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStopJobTrackerResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopJobTrackerResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStopJobTrackerResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopNameNode.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStopNameNode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopNameNode.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStopNameNode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopNameNodeResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStopNameNodeResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopNameNodeResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStopNameNodeResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopTaskTracker.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStopTaskTracker",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopTaskTracker.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStopTaskTracker>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopTaskTrackerResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sStopTaskTrackerResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopTaskTrackerResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sStopTaskTrackerResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ContinueJob.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sContinueJob",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ContinueJob.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sContinueJob>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ContinueJobResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sContinueJobResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ContinueJobResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sContinueJobResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ControlJob.cpp:445:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ControlJob.cpp:450:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ControlJob.cpp:506:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sreason>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ControlJob.cpp:511:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sreason>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ControlJobResponse.cpp:297:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ControlJobResponse.cpp:302:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_HoldJob.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sHoldJob",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_HoldJob.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sHoldJob>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_HoldJobResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sHoldJobResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_HoldJobResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sHoldJobResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ReleaseJob.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sReleaseJob",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ReleaseJob.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sReleaseJob>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ReleaseJobResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sReleaseJobResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ReleaseJobResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sReleaseJobResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_RemoveJob.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sRemoveJob",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_RemoveJob.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sRemoveJob>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_RemoveJobResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sRemoveJobResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_RemoveJobResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sRemoveJobResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttribute.cpp:427:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttribute.cpp:432:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttribute.cpp:488:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sattribute",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttribute.cpp:493:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sattribute>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttributeResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sSetJobAttributeResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttributeResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sSetJobAttributeResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1268:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1310:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%scmd>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1315:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%scmd>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sargs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1381:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sargs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1443:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1448:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sowner>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1510:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%siwd>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1515:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%siwd>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1576:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssubmission_name>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1581:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssubmission_name>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1642:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%srequirements",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1648:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%srequirements>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1724:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sextra",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJob.cpp:1730:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sextra>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJobResponse.cpp:415:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJobResponse.cpp:420:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJobResponse.cpp:476:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SubmitJobResponse.cpp:481:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SuspendJob.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sSuspendJob",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SuspendJob.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sSuspendJob>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SuspendJobResponse.cpp:340:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sSuspendJobResponse",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SuspendJobResponse.cpp:345:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sSuspendJobResponse>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_Locate.cpp:392:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_Locate.cpp:434:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sid",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_Locate.cpp:439:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sid>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_LocateResponse.cpp:471:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sresources",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_LocateResponse.cpp:477:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sresources>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_LocateResponse.cpp:554:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/locator/src/AviaryLocator_LocateResponse.cpp:559:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:510:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdata",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:515:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdata>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:571:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smax_bytes>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:576:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smax_bytes>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:581:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_2, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Max_bytes);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:627:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sfrom_end>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:632:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sfrom_end>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:637:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                           strcpy(text_value_3, (property_From_end)?"true":"false");
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:781:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sdata",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:786:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sdata>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:842:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sstatus",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:847:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sstatus>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:902:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sfile_name>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:907:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sfile_name>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:968:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sfile_size>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:973:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sfile_size>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:978:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_4, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_File_size);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:1024:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%scontent>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:1029:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%scontent>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDetails.cpp:437:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDetails.cpp:478:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDetails.cpp:484:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDetailsResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sjobs",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDetailsResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sjobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobStatus.cpp:437:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobStatus.cpp:478:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobStatus.cpp:484:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobStatusResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sjobs",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobStatusResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sjobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobSummary.cpp:437:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobSummary.cpp:478:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobSummary.cpp:484:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobSummaryResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sjobs",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobSummaryResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sjobs>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp:496:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssize>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp:501:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%ssize>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp:506:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_1, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Size);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp:552:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%smode",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp:557:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%smode>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp:612:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%soffset",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp:617:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%soffset>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionIDResponse.cpp:467:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionIDResponse.cpp:473:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionIDResponse.cpp:550:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sremaining>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionIDResponse.cpp:555:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(end_input_str, "</%s%sremaining>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionIDResponse.cpp:560:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                               sprintf (text_value_2, AXIS2_PRINTF_INT32_FORMAT_SPECIFIER, property_Remaining);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionSummary.cpp:500:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionSummary.cpp:518:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                           sprintf(string_to_stream, " %s%s%s=\"%s\"", p_prefix?p_prefix:"", (p_prefix && axutil_strcmp(p_prefix, ""))?":":"",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionSummary.cpp:559:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%sids",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionSummary.cpp:565:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%sids>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionSummaryResponse.cpp:376:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(start_input_str, "<%s%ssubmissions",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionSummaryResponse.cpp:382:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                         sprintf(end_input_str, "</%s%ssubmissions>",
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/Collectables.cpp:69:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(m_stats.CondorPlatform.c_str(),CONDOR_PLATFORM_FORMAT,arch,opsys);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryUtils.cpp:270:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    n = vsnprintf(fixbuf, fixlen, format, pargs);    
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryUtils.cpp:273:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    n = vsnprintf(fixbuf, fixlen, format, args);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryUtils.cpp:298:14:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    int nn = vsnprintf(varbuf, n, format, pargs);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryUtils.cpp:301:14:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    int nn = vsnprintf(varbuf, n, format, args);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:67:29:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                        tmp.sprintf("%s/hdfs", rd);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:91:22:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                buff.sprintf("%s/", logdir);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:95:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        buff.sprintf("%s/conf", m_hadoopHome.Value());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:98:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        buff.sprintf("%s/", m_hadoopHome.Value());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:101:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        buff.sprintf("%s", m_hadoopHome.Value());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:169:18:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        confFile.sprintf("%s/%s", logdir, m_coreSiteFile.Value());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:206:18:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        confFile.sprintf("%s/%s", logdir, m_hdfsSiteFile.Value());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:463:26:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                log4jarg.sprintf("-Dhadoop.root.logger=%s,DRFA", (log4j != NULL ? log4j : "INFO"));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:467:25:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                log_dir.sprintf("-Dhadoop.log.dir=%s/HDFS_Logs", ldir);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:655:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        temp.sprintf("    <name>%s</name>", key);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:658:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        temp.sprintf("    <value>%s</value>", value);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:685:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       adKey.sprintf("SAFEMODE");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:688:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
           adValue.sprintf("ON");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:690:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
           adValue.sprintf("OFF");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:876:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			s.sprintf("HDFS_NAMENODE");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:880:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			s.sprintf("HDFS_DATANODE");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/getPort.cpp:39:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(path, "%s%cqpidPort", logPath, DIR_DELIM_CHAR);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon.cpp:155:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	sprintf(proc, "%s%c%s",execDir, DIR_DELIM_CHAR, "declareQueues");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:358:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(cmd.c_str());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener.cpp:38:12:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	FILE *f = popen("daemonReader", "r");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener.cpp:45:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(hostname, "%s", buffer);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:48:12:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	FILE *f = popen("daemonReader", "r");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:55:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(hostname, "%s", buffer);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:149:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(cmd.c_str());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:160:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(cmd.c_str());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:59:12:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	FILE *f = popen("daemonReader", "r");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:66:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(hostname, "%s", buffer);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.h:52:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cid, c_id);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.h:55:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pid, p_id);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.h:66:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cid, c_id);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:874:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(pid, pid_in_key);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1362:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(dest, src_name);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1364:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(dest, src_val);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1400:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(sql_str, tmp);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:329:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = %d", ATTR_QUILL_SQL_LAST_BATCH, 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:333:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = %d", ATTR_QUILL_SQL_TOTAL, 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:337:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = %d", "TimeToProcessLastBatch", 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:341:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = %d", "IsConnectedToDB", 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:382:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( expr, "%s = TRUE", ATTR_QUILL_IS_REMOTELY_QUERYABLE);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:384:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( expr, "%s = FALSE", ATTR_QUILL_IS_REMOTELY_QUERYABLE);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:388:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = %d", "QuillPollingPeriod", pollingPeriod );
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:403:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = \"%s\"", ATTR_NAME, quill_name );
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:406:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = \"%s\"", ATTR_SCHEDD_NAME, scheddName );
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:413:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = \"%s\"", ATTR_MACHINE, get_local_fqdn().Value() ); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:420:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( expr, "%s = \"%s\"", ATTR_MY_ADDRESS, mysockname );
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:888:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1346:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1633:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1924:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2205:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2330:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2416:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2505:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2513:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(f_name, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2515:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(f_host, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2517:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(f_path, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2519:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(f_ts, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2539:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pathname, "%s/%s", f_path, f_name);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2604:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2611:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(f_name, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2613:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(f_host, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2615:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(f_path, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2617:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(f_ts, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2621:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(globaljobid, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2623:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(type, attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2701:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2776:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(pathname, "%s/%s", path, name);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2840:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2895:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				sscanf(iter, "%s =", attName);
data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/plumage_history_load_main.cpp:371:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf.Value(), "%*s %*s %*s %ld %*s %*s %d %*s %*s %d %*s %*s %s %*s %*s %ld", 
data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/plumage_history_load_main.cpp:399:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
            sscanf(buf.Value(), "%*s %*s %*s %ld %*s %*s %d %*s %*s %d %*s %*s %s %*s %*s %ld", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.cpp:69:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf,"%s_TIMEOUT_MULTIPLIER",get_mySubSystem()->getName() );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.cpp:1747:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s_NAME", daemonString(_type) );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1342:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s = %d", ATTR_JOB_ACTION, action );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1345:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s = %d", ATTR_ACTION_RESULT_TYPE, 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1359:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tmp, "%s = %s", ATTR_ACTION_CONSTRAINT, constraint ); 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1381:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( tmp, "%s = \"%s\"", ATTR_ACTION_IDS, action_ids );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1398:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tmp, "%s = \"%s\"", reason_attr, reason );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1647:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s = %d", ATTR_ACTION_RESULT_TYPE, 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1722:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buf, "Job %d.%d %s", job_id.cluster, job_id.proc,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1746:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buf, "Permission denied to %s job %d.%d", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_startd.cpp:611:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s = \"%s\"", ATTR_COMMAND,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_startd.cpp:615:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s = \"%s\"", ATTR_CLAIM_TYPE, getClaimTypeString(cType) );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_softkill.WINDOWS.cpp:52:3:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfwprintf(debug_fp, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:438:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(max_fds_name,"%s_MAX_FILE_DESCRIPTORS",get_mySubSystem()->getName());
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:6163:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf ( purebuf, "-program-name=%s", m_executable );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:7722:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(executable,F_OK | X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:8014:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
						(access(executable_fullpath, R_OK | X_OK) == 0) &&
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:9761:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(exception_string,"exception %s",
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:9768:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(exception_string,"signal %d (%s)",sig,strsignal(sig));
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:11027:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( localAd_path, "%s_DAEMON_AD_FILE", get_mySubSystem()->getName() );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:333:21:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		int exec_status = execl( shutdown_program, shutdown_program, NULL );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:343:21:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		int exec_status = execl( shutdown_program, shutdown_program, NULL );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:405:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( addr_file, "%s_ADDRESS_FILE", prefix.Value() );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:418:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( addr_file, "%s_SUPER_ADDRESS_FILE", prefix.Value() );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:490:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( tmp, "%s/%s", log, pidFile );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:583:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s_LOG", get_mySubSystem()->getName() );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:592:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp2, "%s.%s", tmp1, append_str );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:686:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s-%d", get_local_ipaddr(CP_IPV4).to_ip_string().Value(), mypid );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:694:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "_%s_STARTD_NAME=%d", myDistro->Get(), mypid );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:1056:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pname, name);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:1906:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		get_mySubSystem()->printf( );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:1975:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(ptmp1,"%s_CONFIG=%s", myDistro->GetUc(), ptmp);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_daemon_core.cpp:33:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(result.response.message, platform);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_daemon_core.cpp:47:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(result.response.message, version);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:886:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if ( access( shallowOpts.strConfigFile.Value(), F_OK ) != 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_dagman/dag.cpp:1517:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	_dagIsHalted = ( access( _haltFile.Value() , F_OK ) == 0 );
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:182:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if ( access( _dagmanConfigFile, R_OK ) != 0 &&
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:1310:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    	bool recovery = access(lockFileName,  F_OK) == 0;
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:1393:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		bool has_new_default_log = access( dagman._defaultNodeLog.Value(),
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_multi_dag.cpp:210:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if ( access( testName.Value(), F_OK ) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/dllmain.cpp:103:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(k, e.key);
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/dllmain.cpp:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(k, e.key);
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs.cpp:141:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, method, ap);
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs.cpp:307:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cURI, "hdfs://%s:%d", host, (int)(port));
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.h:46:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.h:46:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs_plugin.cpp:140:22:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                buff.sprintf("%s/conf", home);
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs_plugin.cpp:142:22:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                buff.sprintf("%s/lib", home);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:292:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buff, "CONDOR/%s/%s/%s", remotePoolName ? remotePoolName : "NULL",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:1331:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(attrs_to_copy[i], attribute.c_str());
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamresource.cpp:145:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( delegationServiceUri, delegservice_name );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamresource.cpp:156:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( serviceUri, service_name );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:339:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf," %d%s",req,args?" ":"");
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusresource.cpp:914:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		if ( sscanf( buff, "%s %d", contact, &status ) == 2 &&
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.cpp:724:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( expr_buf,
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.cpp:734:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( expr_buf,
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.cpp:866:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( expr_buf, "(%s) && (%s) && (%s == %d || %s == %d || (%s == %d && %s =?= \"%s\"))",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.cpp:938:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( expr_buf, "%s && %s && %s && %s",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/unicore_gahp_wrapper.cpp:91:11:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int rc = execv ( java, params );  
data/condor-8.6.8~dfsg.1/src/condor_had/AbstractReplicatorStateMachine.cpp:98:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( bufArray, 
data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp:684:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf( buffer,
data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp:719:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf( buffer,
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_compress.h:61:29:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	unsigned char extra_flags, system;
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_access.h:45:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#undef access
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_access.h:46:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define access(x,y) access_euid(x,y)
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_access.h:51:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#undef access
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_fix_access.h:52:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define access(x,y) __access_(x,y)
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_snutils.h:43:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int snprintf(char *str, size_t size, const char *format, ...);
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_snutils.h:48:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int __cdecl vsnprintf(char *str, size_t size, const char *format, va_list args);
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_nt.h:109:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define popen _popen
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_nt.h:119:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
DLL_IMPORT_MAGIC int __cdecl access(const char *, int);
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_nt.h:120:9:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define execl _execl  
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_sys_nt.h:121:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define execv _execv
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:163:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(_sinful_peer_buf, sinful_string.Value());
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:1332:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(str, "ID: %s, %d, %lu, %d\n",
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:95:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(shared_secret,passwordA);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:96:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(shared_secret,passwordB);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1538:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	if(prefix_len != sprintf((char *)buffer, "%s %s", t_buf->a, t_buf->b)) {
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_sspi.cpp:317:15:  [4] (access) ImpersonateSecurityContext:
  If this call fails, the program could fail to drop heightened privileges
  (CWE-250). Make sure the return value is checked, and do not continue if a
  failure is reported.
    rc = (pf->ImpersonateSecurityContext)( &srvCtx );
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:314:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tmp, comment);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:382:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy (one_line, buffer);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:563:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( local_user, tmp_user );
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:616:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmp, fqh);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:622:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(tmp, rest);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:260:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(pList, "%s,%s", pNewList, pOldList);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:1256:3:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		scanf("%s",buf);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:1265:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf1,"<%s:1970>",buf);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:581:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fmt, "SEC_%s_%%s_SESSION_DURATION", get_mySubSystem()->getName() );
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:802:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buf, "%s=\"%s\"", ATTR_SEC_AUTHENTICATION, SecMan::sec_feat_act_rev[authentication_action]);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:814:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buf, "%s=\"%s\"", ATTR_SEC_ENCRYPTION, SecMan::sec_feat_act_rev[encryption_action]);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:817:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buf, "%s=\"%s\"", ATTR_SEC_INTEGRITY, SecMan::sec_feat_act_rev[integrity_action]);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:828:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (buf, "%s=\"%s\"", ATTR_SEC_AUTHENTICATION_METHODS_LIST, the_methods.Value());
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:837:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (buf, "%s=\"%s\"", ATTR_SEC_AUTHENTICATION_METHODS, first);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:855:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (buf, "%s=\"%s\"", ATTR_SEC_CRYPTO_METHODS, the_methods.Value());
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:886:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buf, "%s=\"%i\"", ATTR_SEC_SESSION_DURATION,
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:913:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buf, "%s=\"YES\"", ATTR_SEC_ENACT);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:2611:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf (keybuf, "{%s,<%s>}", addr.Value(), cmd);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1046:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(outbuf,"%d*%s*",_special_state,_who.to_sinful().Value());
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1047:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(parent_state,outbuf);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1051:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(parent_state, crypto);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1056:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(parent_state, md);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1114:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        citems = sscanf(ptmp,"%s",sinful_string);
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:331:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(_my_ip_buf, addr.to_ip_string().Value());
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:662:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(str, "%s", sock_to_string(_sock));
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:824:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(outbuf,"%d*%s*", _special_state, _who.to_sinful().Value());
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:825:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(parent_state,outbuf);
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:860:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        citems = sscanf(ptmp,"%s",sinful_string);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:1296:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		cached_result = access(socket_dir.c_str(),W_OK)==0;
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:1304:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				cached_result = access(parent_dir,W_OK)==0;
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2421:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(_peer_ip_buf, peer_ip.Value());
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2566:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(_my_ip_buf, ip_str.Value());
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2597:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(_sinful_peer_buf, sinful_peer.Value());
data/condor-8.6.8~dfsg.1/src/condor_job_router/job_router_info.cpp:114:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout, &"\n%s"[(cch > 150) ? 0 : 1], message);
data/condor-8.6.8~dfsg.1/src/condor_kbdd/XInterface.unix.cpp:104:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env, "XAUTHORITY=%s/.Xauthority", passwd_entry->pw_dir);
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:497:3:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execl( kernelTuningScript.c_str(), kernelTuningScript.c_str(), (char *) NULL );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:1020:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int status = access( path, X_OK );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:1867:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf ( dagman_image_path, "%s\\%s", bin_path, dagman_exe );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:154:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s_LOG", name);
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:370:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s_FLAG", name_in_config_file );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:398:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s_ENVIRONMENT", name_in_config_file );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:418:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "MASTER_%s_CONTROLLER", name_in_config_file );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:434:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "MASTER_%s_BACKOFF_CONSTANT", name_in_config_file );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:437:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "MASTER_%s_BACKOFF_CEILING", name_in_config_file );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:440:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "MASTER_%s_BACKOFF_FACTOR", name_in_config_file );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:446:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "MASTER_%s_RECOVER_FACTOR", name_in_config_file );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:460:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "%s_FLAG", name_in_config_file);
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:597:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(process_name,X_OK) != 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1365:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( buf, "%s_ADMIN_EMAIL", name_in_config_file );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1589:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(ready_state, state);
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:2785:8:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	(void)execv(master->process_name, argv);
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:2823:10:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			(void)execl(systemshell, "/Q", "/C",
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:3185:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s_Timestamp = %ld", 
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:3190:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( buf, "%s_StartTime = %ld", 
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:3196:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( buf, "%s_StartTime = 0", 
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/accountant_log_fixer.cpp:128:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, args);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:339:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buf, "MY.%s > MY.%s", ATTR_RANK, ATTR_CURRENT_RANK);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:342:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buf, "MY.%s >= MY.%s", ATTR_RANK, ATTR_CURRENT_RANK);
data/condor-8.6.8~dfsg.1/src/condor_power/power.cpp:140:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf ( stderr, msg, args );
data/condor-8.6.8~dfsg.1/src/condor_power/power_state.cpp:156:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf ( stderr, msg, args );
data/condor-8.6.8~dfsg.1/src/condor_prio/prio.cpp:252:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(constraint, "%s == %d", ATTR_CLUSTER_ID, cluster);
data/condor-8.6.8~dfsg.1/src/condor_prio/prio.cpp:300:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(constraint, "%s == \"%s\"", ATTR_OWNER, arg);
data/condor-8.6.8~dfsg.1/src/condor_privsep/privsep_client.UNIX.cpp:236:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(cmd.Value(), arg_list.GetStringArray());
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:88:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(err_stream, fmt, ap);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:120:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(err_stream, fmt, ap);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:464:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%s=%s", var, val);
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:743:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		if ( sscanf( line, "%d %s %c %d "
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:986:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			sscanf( s, "%s %lu", junk, &stat_boottime );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:1706:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_t.cpp:65:4:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  scanf("%s", jobname);
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_t.cpp:220:12:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    rval = execl( jobname, jobname, (char*)0 );
data/condor-8.6.8~dfsg.1/src/condor_procapi/processid.cpp:422:18:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    int retval = fprintf(fp, 
data/condor-8.6.8~dfsg.1/src/condor_procapi/processid.cpp:450:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	int retval = fprintf(fp,
data/condor-8.6.8~dfsg.1/src/condor_procapi/processid.cpp:481:21:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	int nr_extracted = fscanf( fp, 
data/condor-8.6.8~dfsg.1/src/condor_procapi/processid.cpp:519:21:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	int nr_extracted = fscanf( fp, 
data/condor-8.6.8~dfsg.1/src/condor_procd/dprintf_lite.cpp:66:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(debug_fp, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_procd/dprintf_lite.cpp:100:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(debug_fp, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_procd/dprintf_lite.cpp:148:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf( old, "%s.old", debug_fn );
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:52:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(err_str, ERR_STRLEN + 1, fmt, ap);
data/condor-8.6.8~dfsg.1/src/condor_procd/glexec_kill.unix.cpp:108:3:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execv(glexec_kill_path, argv);
data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_util.unix.cpp:77:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(watchdog_path, orig_path);
data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_util.unix.cpp:78:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(watchdog_path + orig_path_len, WATCHDOG_SUFFIX);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:653:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( scheddMachine, "%s", tmp );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:852:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( constraint, "%s > 0 || %s > 0 || %s > 0 || %s > 0 || %s > 0", 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1398:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (constraint, "%s == \"%s\"", ATTR_NAME, daemonname);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1404:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf (constraint, "%s == \"%s\"", ATTR_QUILL_NAME, daemonname);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1454:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (constraint, "%s == \"%s\"", ATTR_NAME, argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1463:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf (constraint, "%s == \"%s@%s\"", ATTR_NAME, argv[i], 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1557:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(constraint, "%s == \"%s\"", ATTR_SCHEDD_IP_ADDR, argv[i+1]);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2068:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(constraint, ATTR_CLUSTER_ID " == %d && " ATTR_PROC_ID " == %d", it->_cluster, it->_proc);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2070:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(constraint, ATTR_CLUSTER_ID " == %d", it->_cluster);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2077:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(constraint, ATTR_DAGMAN_JOB_ID " == %d", it->_cluster);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2504:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(tmp, NiceUserName);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2657:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy( jm, &tmp[1] );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3401:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(fmt.c_str(), ""    , "Slot", "Slot's Req ", "  Job's Req ", "Both   ");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3402:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(fmt.c_str(), "Name", "Type", "Matches Job", "Matches Slot", "Match %");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3403:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				printf(fmt.c_str(), "------------------------", "----", "------------", "------------", "----------");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3419:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(fmt, "",              " Autocluster", "   Matches  ", "  Machine  ", "  Running  ", "  Serving ", "", "");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3420:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(fmt, " JobId",        "Members/Idle", "Requirements", "Rejects Job", " Users Job ", "Other User", "Available", summarize_with_owner ? "Owner" : "");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3421:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(fmt, "-------------", "------------", "------------", "-----------", "-----------", "----------", "---------", summarize_with_owner ? "-----" : "");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3477:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
					printf(fmt, achJobId, achAutocluster,
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4023:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		int wid = sprintf(buf, fmt->printfFmt ? fmt->printfFmt : "%.1f", p->max_mem_usage);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5059:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf( buffer , "%s = %f" , ATTR_REMOTE_USER_PRIO , 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5073:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( buffer, "MY.%s > MY.%s", ATTR_RANK, ATTR_CURRENT_RANK );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5076:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( buffer, "MY.%s >= MY.%s", ATTR_RANK, ATTR_CURRENT_RANK );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5079:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buffer, "MY.%s > TARGET.%s + %f", ATTR_REMOTE_USER_PRIO, 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5337:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(return_buff, "\n%03d.%03d:  %s\n\n" , cluster, proc, job_status.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5366:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(return_buff, "\n%03d.%03d:  %s\n\n" , cluster, proc, job_status.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5370:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(return_buff, match_result.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5567:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(return_buff, "\n%03d.%03d:  %s\n\n" , cluster, proc, job_status.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5572:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( return_buff + strlen(return_buff), "Last successful match: %s", ctime(&t) );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5580:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(return_buff, rej_str.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5584:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(return_buff, rej_str.c_str());	
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5588:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(return_buff + strlen(return_buff), 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5594:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5603:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5609:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5613:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5618:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5627:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5772:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat( return_buff, ana_buffer );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5917:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(return_buff, "\n-- Slot: %s : Analyzing matches for %d Jobs in %d autoclusters\n", 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5949:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(return_buff, pretty_req.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5963:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(return_buff, attrib_values.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5971:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat(return_buff, attrib_values.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5987:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(return_buff, subexpr_detail.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6000:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(return_buff, pretty_req.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6008:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(return_buff, fmt, slotname.c_str(), slot_type, 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6017:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(return_buff, ana_buffer.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6082:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buffer, "%s%s%s", 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6088:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buffer, "%s%s%s@%s", 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6109:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (query_constraint, "%s == \"%s\"", ATTR_NAME, quill_name);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6156:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tstr, "<%s>", tmpdatabaseip);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6190:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(port, ptr_colon+1);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6199:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(dbconn, "%s %s user=quillreader password=%s dbname=%s",
data/condor-8.6.8~dfsg.1/src/condor_release/examples/env.cpp:67:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( data[cur_size], str );
data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp:128:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( word, "%s", getJobActionString(mode) );
data/condor-8.6.8~dfsg.1/src/condor_rmdir/bprint.h:31:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define printf freddy
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:567:4:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
   lstrcpy(psz, pszPath);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:578:7:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      lstrcpy(pszNext, pszPattern);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:665:13:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
            lstrcpy(pszNext, wfd.cFileName); 
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:684:7:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      lstrcpy(pszNext, TEXT("*"));
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:715:10:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
         lstrcpy(pszNext, pdir->wfd.cFileName); 
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:1062:4:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
   lstrcpy(szFullPath, szPre);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:1069:10:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
         lstrcpy(pszFullPath, szPre);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.cpp:611:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(gman_node->owner,owner);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.cpp:614:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(gman_node->domain,domain);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:708:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( super_users[i], tmp );
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4479:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(rebuild,"%s = \"%s\"", name, fallback);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4537:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(bigbuf2,"%s%s%n%s",left,tvalue,&search_pos,right);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4544:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(attribute_value,"%s=%s",curr_attr_to_expand,
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:5455:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(powner,NiceUserName);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:5483:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(PrioRec[N_PrioRecs].owner,owner);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:5568:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( reason, "\"%s (by user %s)\"", tmp, owner );
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_td.cpp:1440:19:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					new_path_buf.sprintf(
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:149:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(array.__ptr[i].name, info->name);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1001:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(result.response.status.message,
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1156:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(result.response.message,
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1219:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(result.response.message,
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1268:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(result.response.status.message,
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1309:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(result.response.status.message,
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1396:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(result.response.status.message,
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1418:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(result.response.status.message,
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1552:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(result.response.requirements.__ptr[i], buffer);
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:58:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int r = system("condor_chirp get_job_attr RemoteHosts > nodes");
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:100:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(command, argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:104:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	r = system(command);
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:2034:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		rval = access(path, flags);
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:508:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s=\"%s\"", ATTR_REMOVE_REASON, reason );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:748:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s = %d", ATTR_LAST_VACATE_TIME, (int)time(0) ); 
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:783:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s=\"%s\"", ATTR_REQUEUE_REASON, reason );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/pseudo_ops.cpp:167:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buf, "%s = %d", ATTR_UID, (int)get_user_uid() );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/pseudo_ops.cpp:170:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buf, "%s = %d", ATTR_GID, (int)get_user_gid() );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1625:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s = %d", ATTR_TOTAL_SUSPENSIONS, total_suspensions );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1628:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s = %d", ATTR_LAST_SUSPENSION_TIME, now );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1636:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s = %d", ATTR_JOB_STATUS , SUSPENDED );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1678:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s = %d", ATTR_CUMULATIVE_SUSPENSION_TIME,
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1683:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s = 0", ATTR_LAST_SUSPENSION_TIME );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1691:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s = %d", ATTR_JOB_STATUS , RUNNING );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1917:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( tmp, "%s=TRUE", ATTR_ON_EXIT_BY_SIGNAL );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1921:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( tmp, "%s=%d", ATTR_ON_EXIT_SIGNAL, exit_value );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1926:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( tmp, "%s=FALSE", ATTR_ON_EXIT_BY_SIGNAL );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1930:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( tmp, "%s=%d", ATTR_ON_EXIT_CODE, exit_value );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/job_report.cpp:82:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(text, context);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/job_report.cpp:84:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(text, message);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/job_report.cpp:86:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(text, message);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:361:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buffer, "%s%s", s1, s2);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:418:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s = %d", ATTR_TOTAL_SUSPENSIONS, total_suspensions);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:423:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s = %d", ATTR_LAST_SUSPENSION_TIME, 
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:435:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s = %d", ATTR_CUMULATIVE_SUSPENSION_TIME,
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:447:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s = %d", ATTR_LAST_SUSPENSION_TIME, 
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/ops.cpp:95:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			(void)strcpy( MsgBuf, buf );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1639:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	result = access(ICkptName,R_OK);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1706:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( Executing_Filesystem_Domain, fs_domain );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1721:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( Executing_UID_Domain, uid_domain );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1996:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(host,servers[0]);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:2008:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(host,servers[i+1]);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:114:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char *strcpy();
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:602:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( ErrBuf,  "Can't chdir() to \"%s\"! [%s(%d)]", Proc->iwd, 
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:819:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "Periodic Policy: holding job because %s has "
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:822:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "Your job has been held because %s has become "
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:824:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf2, "Your job has been held because %s has become "
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:891:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "Your job has been held because %s has become "
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:893:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf2, "Your job has been held because %s has become "
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1306:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( TmpCkptName, "%s.tmp", CkptName );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1314:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( RCkptName, CkptName );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1622:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(names[0], ckpt_name);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1623:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(names[1], ckpt_name);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:104:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
char *strcpy();
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:630:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				(void)sprintf(notification,
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:637:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				(void)sprintf(notification,
data/condor-8.6.8~dfsg.1/src/condor_soapshell/soap_soapshellStub.cpp:50:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(result.response.message,temp.Value());
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResAttributes.h:164:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy((char*)(pav+1), pszAttr);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResAttributes.h:171:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(const_cast<char*>(pav->StringValue()), value);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_params.cpp:94:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( buf, m_libexec );
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_params.cpp:96:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( buf, exe );
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/vmuniverse_mgr.cpp:263:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(tmp,X_OK) < 0) {
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:490:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(pszAttr, pszPrefix);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:536:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pszAttr, pszPrefix);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1353:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sz, "%f%s", value, pszUnits);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1503:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		cch = sprintf(psz, pszFmt, value.ul);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1518:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(&psz[cch], pszUnits);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1803:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((char*)(pav+1), pszAttr);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1294:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(ssh_to_job_sshd_setup.Value(),X_OK)!=0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1298:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(ssh_to_job_shell_setup.Value(),X_OK)!=0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1312:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(sshd_config_template.Value(),F_OK)!=0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1380:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if( access(shell,X_OK)==0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1536:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(sshd.Value(),X_OK)!=0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:3237:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if ( access(wrapper,X_OK) >= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:3423:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
				if (sscanf(tmp, prefix.Value(), &slot_number) < 1) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:3454:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			if ( sscanf(tmp, prefix.Value(), &slot_number) < 1 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/docker_proc.cpp:646:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(volumePath2, volumePath);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/docker_proc.cpp:648:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(volumePath2, volumePath);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:103:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if(sscanf(line,"cookie %s",check_cookie)==1) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:878:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(path, temp_path);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:883:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(path, temp_path);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:210:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( param_name, "%s_%s", key, attr );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:213:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( param_name, "%s_%s", key, alt_name );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:256:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( param_name, "%s_%s", key, ATTR_JOB_UNIVERSE );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:260:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( param_name, "%s_universe", key );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:953:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s=\"%s\"", ATTR_UID_DOMAIN, uid_domain );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:960:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s=\"%s\"", ATTR_FILE_SYSTEM_DOMAIN, fs_domain ); 
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:980:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s=\"%s\"", ATTR_ARCH, tmp_val );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:989:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s=\"%s\"", ATTR_OPSYS, tmp_val );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:999:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tmp, "%s=\"%s\"", ATTR_CKPT_SERVER, tmp_val ); 
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:1008:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( tmp, "%s=TRUE", ATTR_HAS_RECONNECT );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2056:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buf, "%s=%lu", ATTR_DISK_USAGE, (long unsigned)((execsz+1023)/1024) ); 
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2575:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(ccfilename, "%s%c%s.cc", cred_dir, DIR_DELIM_CHAR, user.c_str());
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2606:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmpfilename, "%s%c%s.cred.tmp", cred_dir, DIR_DELIM_CHAR, user.c_str());
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2607:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(filename, "%s%c%s.cred", cred_dir, DIR_DELIM_CHAR, user.c_str());
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2705:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(ccfilename, "%s%c%s.cc", cred_dir, DIR_DELIM_CHAR, user.c_str());
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2727:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sandboxccfilename, "%s%c%s.cc", Starter->GetWorkingDir(), DIR_DELIM_CHAR, user.c_str());
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2728:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(sandboxcctmpfilename, "%s%c%s.cc.tmp", Starter->GetWorkingDir(), DIR_DELIM_CHAR, user.c_str());
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.cpp:193:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s = %d", ATTR_NODE, Node );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_master_proc.cpp:307:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s=\"%s:%d\"", ATTR_MPI_MASTER_ADDR, 
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/os_proc.cpp:179:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if( access(wrapper,X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/os_proc.cpp:203:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if( access(parrot,X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.cpp:208:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s = %d", ATTR_NODE, Node );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:127:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (0 == access(filename.Value(), F_OK)) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:165:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buf, "%s%s=%d", name ? name : "", ATTR_JOB_PID,
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:171:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buf, "%s%s=%ld", name ? name : "", ATTR_JOB_START_DATE,
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:179:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s%s=%f", name ? name : "", ATTR_JOB_DURATION, 
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:194:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s%s = TRUE", name ? name : "",
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:197:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s%s = %d", name ? name : "",
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:200:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s%s = \"died on %s\"",
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:205:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s%s = FALSE", name ? name : "",
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:208:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s%s = %d", name ? name : "",
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_proc.cpp:224:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( !vmgahpfile || (access(vmgahpfile,X_OK) < 0) ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_common.cpp:121:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tmp2, "%s.%s", tmp1, logAppend );
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_common.cpp:252:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ( access(wrapper,X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_main.cpp:654:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "%s%d\n", susp_msg, sum);
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_main.cpp:667:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(msg, "%s\n", unsusp_msg);
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:176:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( cmd, "ps -ef | egrep %s", PROG_NAME );
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:178:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( cmd, "ps -ax | egrep %s", PROG_NAME );
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:181:10:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if( (fp=popen(cmd,"r")) == NULL ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:285:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if( access(m_a_out,X_OK) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:963:27:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				if(core_name != NULL) strcpy( core_name,corebuf.Value() );
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1315:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(physical_name,"local:%s",logical_name);
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1397:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( cmd, s.cmd );
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1444:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( local_dir, buf.Value() );
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1471:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( cur_ckpt, buf.Value() );
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1541:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buf, fmt.printfFmt, fl);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:722:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (buffer, "%s == \"%s\" && Cpus > 0", ATTR_STATE, state_to_string(unclaimed_state));
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:728:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (buffer, "%s == \"%s\"", ATTR_STATE, state_to_string(claimed_state));
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:734:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf (buffer, ATTR_NUM_COD_CLAIMS " > 0");
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:740:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buffer, "%s == TRUE", ATTR_HAS_JAVA );
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:758:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf( buffer, "%s == TRUE", ATTR_ABSENT );
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:770:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buffer, "%s == TRUE", ATTR_HAS_VM);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:791:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buffer, "State == \"%s\" && Cpus > 0 && Memory > 0", state_to_string(unclaimed_state));
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:794:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buffer, "(State == \"%s\" && DynamicSlot =!= true) || (NumDynamicSlots isnt undefined && NumDynamicSlots > 0)", state_to_string(claimed_state));
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:1137:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(info, "%s (%s)", fullhost, daddr);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:1991:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( buffer, "%s =!= UNDEFINED", argv[i] );
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:1999:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buffer,"STATISTICS_TO_PUBLISH = \"%s\"", statistics);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:2050:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf (buffer, ATTR_REMOTE_USER " == \"%s\"", argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:2054:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(buffer, ATTR_NAME "==\"%s\" || " ATTR_MACHINE "==\"%s\"", name, name);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1620:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(userdom, "%s@%s", the_username, the_domainname);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1729:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf(stdout, DashDryRun ? "Dry-Run job(s)" : "Submitting job(s)");
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1994:10:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		rval = execvp("condor_ssh_to_job", const_cast<char *const*>(sshargs));
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:5501:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if( access(rootdir, F_OK|X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:5954:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(pathname.Value(), F_OK|X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:9437:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf( stderr, "\t-batch-name <name>\tappend a line to submit file that sets the batch name\n"
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:9709:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(userdom, "%s@%s", the_username, the_domainname);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:10022:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tbuf,"%s=%d",ATTR_CLUSTER_ID, ClusterId);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:10024:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tbuf,"%s=%d",ATTR_PROC_ID, ProcId);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:160:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp_info, "Win%s",  opsys_super_short_name );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:166:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp_info, "Windows%s",  opsys_super_short_name );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:169:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp_info, "Windows %s SP%d",  opsys_super_short_name, info.wServicePackMajor);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:172:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp_info, "%s%d",  opsys, opsys_version);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:515:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( tmp_info, "%s%d.%d", os_name, major, minor);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:583:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( tmp_info, "%s%s", tmp_opsys_short_name, tmp_release);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:789:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( tmp, "Solaris %s.%s", version, pver );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:808:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp, "%s", sysname);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:810:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(ver, "%s%s", version, release);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:816:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tmp, "%s", sysname);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:820:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat( tmp, pver );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:867:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( tmp_opsys_versioned, "%s%d", tmp_opsys, tmp_opsys_major_version);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1028:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( tmp, "%s", machine );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:76:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(_sysapi_ckptpltfrm, opsys);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:78:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(_sysapi_ckptpltfrm, arch);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:80:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(_sysapi_ckptpltfrm, kernel_version);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:82:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(_sysapi_ckptpltfrm, memory_model);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:85:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(_sysapi_ckptpltfrm, vsyscall_page);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:88:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(_sysapi_ckptpltfrm, processor_flags);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/free_fs_blocks.cpp:108:6:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (fscanf( fp, FS_OUTPUT_FORMAT, &cache_in_use, &cache_size ) != 2) {
data/condor-8.6.8~dfsg.1/src/condor_sysapi/free_fs_blocks_t.cpp:102:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(filename, "%s/sysapi_test_free_fs_blocks", dir);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp:384:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( pathname, "pts/%s", f );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp:452:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( &pathname[5], path );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:568:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access("/usr/ucb/uptime", X_OK) == 0)
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:573:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        else if (access("/usr/bin/uptime", X_OK) == 0)
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:578:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        else if (access("/usr/bsd/uptime", X_OK) == 0)
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:611:8:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			if (fscanf(output_fp, "%s", word) == EOF) {
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus.cpp:479:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( buf_copy, buf );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/processor_flags.cpp:215:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat( processor_flags, flags[i] );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/vsyscall_gate_addr.cpp:81:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		if (sscanf(buf, "VDSO: %s\n", addr) != 1) {
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:63:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		(void)strcpy( pathname, name );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:67:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		(void)strcat( pathname, name );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:107:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					(void)sprintf( my_buf, "%s%s", fs->devname, remote_name );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:109:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					(void)sprintf( my_buf, "%s", fs->devname );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:113:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				(void)sprintf( my_buf, "%s:%s", Hostname, local_name );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:220:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				(void)strcpy( up, maps_to );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:222:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				(void)strcat( up, maps_to );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:227:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			(void)strcat( up, cur );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/getcwd.c:58:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( path, p );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/getcwd.c:100:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(path,tmpbuf);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_startup.c:253:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(ckpt_file,"%s.ckpt",argv[0]);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:140:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
REMAP_TWO( access, __access, int , const char *, int )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:337:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	done = vfprintf(stdout, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:349:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	done = vfprintf(fp, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:361:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	done = vsprintf(s, format, arg);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:403:9:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	done = vfwprintf(fp, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:547:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	done = vsnprintf(s, maxlen, format, arg);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:561:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	done = vsnprintf(s, maxlen, format, arg);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:579:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	return strcat(dest, src);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:599:9:  [4] (format) vswprintf:
  Potential format string problem (CWE-134). Make format string constant.
	done = vswprintf(s, n, format, arg);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:612:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	return vfprintf(fp, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:623:9:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	return vfwprintf(fp, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:628:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	return vfprintf(stdout, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:640:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	return vsnprintf(s, maxlen, format, args);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:653:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	return vsprintf(s, format, args);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:666:9:  [4] (format) vswprintf:
  Potential format string problem (CWE-134). Make format string constant.
	return vswprintf(s, maxlen, format, args);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:671:9:  [4] (format) vwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	return vwprintf(format, ap);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:697:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	return wcscpy(dest, src);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:770:9:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	done = vfwprintf(stdout, format, ap);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:52:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#ifdef access
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:53:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
# undef access
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:199:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(buf[0].d_name,kbuf.d_name);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1875:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
int system( const char *command )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1919:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(str, *environ);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1922:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(str, *ev);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1927:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str, command);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:2140:1:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
getlogin()
data/condor-8.6.8~dfsg.1/src/condor_tests/appendmsg.cpp:41:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern "C" HANDLE __stdcall OpenProcess(unsigned int access, int inherit, unsigned int pid);
data/condor-8.6.8~dfsg.1/src/condor_tests/appendmsg.cpp:85:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern "C" HANDLE __stdcall CreateFileW(wchar_t * name, UINT access, UINT share, void * psa, UINT create, UINT flags, HANDLE hTemplate);
data/condor-8.6.8~dfsg.1/src/condor_tests/appendmsg.cpp:86:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern "C" HANDLE __stdcall CreateFileA(char * name, UINT access, UINT share, void * psa, UINT create, UINT flags, HANDLE hTemplate);
data/condor-8.6.8~dfsg.1/src/condor_tests/appendmsg.cpp:633:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			hOut = CreateFileW(filename, access, FILE_SHARE_ALL, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_constructor_std.cpp:43:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( string, init );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_constructor_std.cpp:52:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( string, str );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_env_std.cpp:67:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( data[cur_size], str );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-async_std.c:55:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s_%lu", prefix, timestamp);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c:73:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(url,"%[^:]://%[^/]%s",method,server,path);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:66:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(filenmbuf, REMDIR);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:108:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(newfilenmbuf, REMDIR);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:109:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(newfilenmbuf, PATHSRCFILE2);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:117:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(tstmessage, TSTMSG);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:144:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(newfilenmbuf, REMDIR);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:186:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(filenmbuf, PATHSRCFILETEST);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:213:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(newfilenmbuf, REMDIR);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:214:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(newfilenmbuf, PATHSRCFILE2);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:391:20:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
	char const *tmp = getlogin();
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:491:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	passed = handle_zng(ret = access(file, mode));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4232:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(snd1, passage);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4233:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(snd2, passage);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4234:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(snd3, passage);
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:48:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(filenmbuf, REMDIR);
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:104:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(newfilenmbuf, REMDIR);
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:116:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(tstmessage, TSTMSG);
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:143:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(newfilenmbuf, REMDIR);
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_eventlog_base.cpp:66:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( p, s );
data/condor-8.6.8~dfsg.1/src/condor_tests/sleep.cpp:78:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern "C" HANDLE __stdcall OpenProcess(unsigned int access, int inherit, unsigned int pid);
data/condor-8.6.8~dfsg.1/src/condor_tests/sleep.cpp:116:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern "C" HANDLE __stdcall CreateFileW(wchar_t * name, UINT access, UINT share, void * psa, UINT create, UINT flags, HANDLE hTemplate);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_conditional_params.cpp:81:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(copy_smaps, "cat /proc/%d/smaps > %s", pid, filename);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_conditional_params.cpp:82:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			int r = system(copy_smaps);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:446:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	    	int items = sscanf(status, "%s %d", label, &size);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_read_joblog.cpp:143:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ( access( logfile, F_OK ) != 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:429:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( my_name, "%s %s", base, argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:109:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int cch = vsnprintf(temp, max_temp, fmt, args);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:116:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		vsnprintf(temp, max_temp, fmt, args);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:326:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int cch = vsnprintf(ptmp, max_temp, fmt, args);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:993:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(prefix,"%s%d",opt_pre,dev);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:998:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stdout, opt_config ? "Detected%s=%s\n" : "Detected%s=\"%s\"\n", opt_tag, detected_gpus.c_str());
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:1011:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(prefix,"%s%d",opt_pre,dev);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:1150:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(prefix,"%s%d",opt_pre,dev);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c:55:3:  [4] (format) _ftprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		_ftprintf(stderr, TEXT("AllocateAndInitializeSid error: %u\n"), GetLastError());
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c:67:3:  [4] (format) _ftprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		_ftprintf(stderr, TEXT("LookupAccountSid error: %u\n"), GetLastError());
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c:80:3:  [4] (format) _ftprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		_ftprintf(stderr, TEXT("AllocateAndInitializeSid error: %u\n"), GetLastError());
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c:92:3:  [4] (format) _ftprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		_ftprintf(stderr, TEXT("LookupAccountSid error: %u\n"), GetLastError());
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:31:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:31:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:220:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s\\%s", Opt.release_dir, control_script);
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:288:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		  sprintf(databaseIp, "<%s>", tmpdatabaseip);
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:320:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(port, ptr_colon+1);
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:329:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(dbconn, "%s %s user=quillreader password=%s dbname=%s", 
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:441:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf.Value(), "%*s %*s %*s %ld %*s %*s %d %*s %*s %d %*s %*s %s %*s %*s %ld", 
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:469:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
            sscanf(buf.Value(), "%*s %*s %*s %ld %*s %*s %d %*s %*s %d %*s %*s %s %*s %*s %ld", 
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:484:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buffer, "MY.%s > MY.%s", ATTR_RANK, ATTR_CURRENT_RANK);
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:486:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (buffer, "MY.%s >= MY.%s", ATTR_RANK, ATTR_CURRENT_RANK);
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:534:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( buffer , "%s = %f" , ATTR_REMOTE_USER_PRIO , 
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:321:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf (tmp, "%s == \"%s\"", ATTR_SCHEDD_NAME, quillName);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1033:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		  sprintf(databaseIp, "<%s>", tmpdatabaseip);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1065:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(port, ptr_colon+1);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1074:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(dbconn, "%s %s user=quillreader password=%s dbname=%s", 
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1356:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf.Value(), "%*s %*s %*s %ld %*s %*s %d %*s %*s %d %*s %*s %s %*s %*s %ld", 
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1391:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
            sscanf(buf.Value(), "%*s %*s %*s %ld %*s %*s %d %*s %*s %d %*s %*s %s %*s %*s %ld", 
data/condor-8.6.8~dfsg.1/src/condor_tools/invalidate_host.cpp:93:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( line, "%s = %s == \"%s\"", ATTR_REQUIREMENTS, ATTR_MACHINE,  
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:250:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	ps = popen( PS_CMD, "r" );
data/condor-8.6.8~dfsg.1/src/condor_tools/master_on.cpp:69:15:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	config_val = popen(config_val_cmd, "r");
data/condor-8.6.8~dfsg.1/src/condor_tools/master_on.cpp:99:2:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execl( master_path, "condor_master", NULL );
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:115:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(bval ? "succeeded" : "failed");
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:226:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(bval ? "    ALLOW " : "     DENY ");
data/condor-8.6.8~dfsg.1/src/condor_tools/probe_process.cpp:39:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf( buf, fmt, pvar );
data/condor-8.6.8~dfsg.1/src/condor_tools/sos.cpp:102:13:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			result = execvp(argv[i],&argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:153:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf( stderr, fmt, args );
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:506:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
						execvp( argArray[0], argArray );
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:884:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argarray[0],argarray);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:98:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(OutStr,"%f\t%d\t%f\t%s\n",T,KbdIdle,LoadAvg,stateStr);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:257:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(LinePtr, QueryArg.Value());
data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp:414:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						strcpy(opts->username, POOL_PASSWORD_USERNAME);
data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp:370:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( MyName, "condor_%s", argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp:1882:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( addr, token );
data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp:1949:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy ( addr, d.addr() );
data/condor-8.6.8~dfsg.1/src/condor_tools/transfer_data.cpp:163:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( constraint, "%s >= 0", ATTR_CLUSTER_ID );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1118:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrName , "Name%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1119:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrPrio , "Priority%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1120:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrResUsed , "ResourcesUsed%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1121:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrRequested , "Requested%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1122:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrWtResUsed , "WeightedResourcesUsed%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1123:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrFactor , "PriorityFactor%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1124:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrBeginUsage , "BeginUsageTime%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1125:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrLastUsage , "LastUsageTime%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1126:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attrAccUsage , "WeightedAccumulatedUsage%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1161:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attr, "EffectiveQuota%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1163:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( attr, "ConfigQuota%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1171:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( attr, "GroupAutoRegroup%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1178:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( attr, "SurplusPolicy%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1195:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( attr, "GroupSortKey%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1199:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( attr, "SubtreeQuota%s", strI );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1391:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(sz, fmt, value);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1396:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(sz, fmt, value);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1471:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(UserCountStr, UserCountFmt, NumElem);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1675:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(UserCountStr, UserCountFmt, UserCount);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1784:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(Fmt,"Resource Name"," Start Time"," Match Time");
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1785:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(Fmt,"-------------"," ----------"," ----------");
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1800:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(Fmt,name,format_date(StartTime),format_time(Now));
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1803:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(Fmt,"-------------"," ------------"," ------------");
data/condor-8.6.8~dfsg.1/src/condor_tools/version.cpp:100:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(fullpath, path);
data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp:45:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system(cmd.Value());
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strlwr.cpp:53:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(input, "%s", "UPPER");
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strlwr.cpp:71:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(input, "%s", "UPPER");
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strupr.cpp:52:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(input, "%s", "lower");
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strupr.cpp:70:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(input, "%s", "lower");
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1802:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s%d", "foo", INT_MAX);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1820:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s%d", "foo", INT_MIN);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1874:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s%u", "foo", UINT_MAX);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1926:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s%ld", "foo", LONG_MAX);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1944:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s%ld", "foo", LONG_MIN);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:983:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(expression, "%s = \"%s\"", attribute_name, expectString);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:1374:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(expression, "%s = \"%s\"", attribute_name, expectString);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:1375:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(expect, "\"%s\"", expectString);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/unit_test_utils.cpp:150:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(*quoted_string,	"\"%s\"", *string);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:106:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, usage, argv[0]);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:148:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
					fprintf(stderr, usage, argv[0]);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:154:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
				fprintf(stderr, usage, argv[0]);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:158:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (access(argv[i], R_OK) < 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.cpp:143:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(job_queue_name, jqn);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogProber.cpp:64:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(job_queue_name, jqn);
data/condor-8.6.8~dfsg.1/src/condor_utils/CondorError.cpp:113:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		vsprintf ( tmp->_message, the_format, ap );
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:270:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pCopy,s);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:751:4:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	::vsprintf(Data + Len, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:1153:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tokenBuf, Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/access_euid.unix.cpp:50:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(pathbuf,"%s%caccess-test-%d-%d-%d",path,DIR_DELIM_CHAR,getpid(),(int)time(NULL),cnt);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:2202:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (x, str);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_oldnew.cpp:490:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(serverTimeStr, "%s = %ld", ATTR_SERVER_TIME, (long)time(NULL) );
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_oldnew.cpp:590:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(serverTimeStr, "%s = %ld", ATTR_SERVER_TIME, (long)time(NULL) );
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_oldnew.cpp:683:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(buf, fmt, (long)time(NULL));
data/condor-8.6.8~dfsg.1/src/condor_utils/command_strings.cpp:502:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(pstr, fmt, num);
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2047:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(*value, strValCStr);
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2250:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( value, strVal.c_str( ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2259:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( value, strVal.c_str( ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2264:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( value, strVal.c_str( ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2288:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy( *value, strVal.c_str( ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2314:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy( *value, strVal.c_str( ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_attributes.cpp:66:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf( tmps, local->string, myDistro->Get() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_attributes.cpp:73:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf( tmps, local->string, myDistro->GetUc() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_attributes.cpp:80:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf( tmps, local->string, myDistro->GetCap() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1079:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( magic_prefix, myDistro->Get() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1207:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access( file, R_OK ) != 0 && !is_piped_command(file)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1347:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (0 != access(global_config_source.c_str(), R_OK)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1360:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (0 != access(file, R_OK) && errno == EACCES) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:3357:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access( toplevel_persistent_config.Value(), R_OK ) == 0 &&
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_environ.cpp:67:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf( tmps, local->string, myDistro->Get() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_environ.cpp:74:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf( tmps, local->string, myDistro->GetUc() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:804:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if( sscanf( line.Value(), "Job submitted from host: %s\n", submitHost ) != 1 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:897:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(submitEventLogNotes, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:906:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(submitEventUserNotes, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1046:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(rmContact, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1055:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(jmContact, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1157:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(reason, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1246:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(rmContact, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1336:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(rmContact, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2373:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
					strcat(terminatestr, core_file);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2381:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(terminatestr,  reason);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2780:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(messagestr, core_file);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2903:3:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		fscanf (file, header) == 0 ||
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2907:3:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		fscanf (file, header) == 0 ||
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2911:3:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		fscanf (file, header) == 0 ||
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2915:3:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		fscanf (file, header) == 0 ||
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:4013:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	int retval = sscanf(line.Value(), "Node %d executing on host: %s",
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5181:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(resourceName, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5271:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(resourceName, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5385:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(resourceName, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5394:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(jobId, mallocstr);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5750:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	retval = fscanf(file, "Changing job attribute %s from %s to %s\n", buf1, buf2, buf3);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5753:12:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		retval = fscanf(file, "Setting job attribute %s to %s\n", buf1, buf3);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:182:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(name, hostname.Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:260:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(name, hostname.Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:284:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(name, hostname.Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:110:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(dest, "%s%d=%d%s%lu%s%u", 
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:125:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	rval = sscanf(src, 
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:32:1:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
snprintf(
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:42:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	length = vsnprintf( str, size, format, args );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:51:1:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
vsnprintf(
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:127:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	length = vsnprintf(&c, 1, format, copyargs);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:131:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	length = vsnprintf(&c, 1, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:139:1:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
snprintf(char *str, size_t size, const char *format, ...)
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:145:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	length = vsnprintf(str, size, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:152:1:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
vsnprintf(char *output, size_t buffer_size, const char *format, va_list args)
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:158:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		vsprintf(output, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:168:4:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
			vsprintf(full_output, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:176:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(output, full_output);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:224:11:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	length = vfprintf(null_output, format, copyargs);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:228:11:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	length = vfprintf(null_output, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_snutils.cpp:267:12:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	written = vsprintf(*buf + *bufpos, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:164:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(tmp, opt);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1042:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(message, preface);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1046:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		vsprintf ( message + cchPre, format, ap );
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1169:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(line_buf.ptr(), line->c_str());
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2761:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			(void)sprintf( rval, "%s%s%s", left, tvalue, right );
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3215:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( buf, cbuf, fmt ? fmt : "%lld", int_val );
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3224:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( buf, cbuf, fmt ? fmt : "%.16G", dbl_val );
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3277:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf(buf, cbuf+1, fmt, mval);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3497:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			(void)sprintf( rval, "%s%s%s", left, tvalue, right );
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3509:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		(void)sprintf( rval, "%s$%s", left, right );
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3609:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			(void)sprintf( rval, "%s%s%s", left, tvalue, right );
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:78:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(watchfilename, "%s%cCREDMON_COMPLETE", cred_dir.ptr(), DIR_DELIM_CHAR);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:90:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(watchfilename, "%s%c%s.cc", cred_dir.ptr(), DIR_DELIM_CHAR, username);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:226:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(watchfilename, "%s%cCREDMON_COMPLETE", cred_dir.ptr(), DIR_DELIM_CHAR);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:238:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(watchfilename, "%s%c%s.cc", cred_dir.ptr(), DIR_DELIM_CHAR, username);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:312:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(markfilename, "%s%c%s.mark", cred_dir.ptr(), DIR_DELIM_CHAR, username);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:411:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(markfilename, "%s%c%s.mark", cred_dir.ptr(), DIR_DELIM_CHAR, username);
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_io.cpp:79:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( line, prefix );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_io.cpp:83:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( line, buf );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_mgr.cpp:140:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( tmp, param_base );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_mgr.cpp:141:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( tmp, param_ext );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_params.cpp:65:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( m_name_buf, &m_base );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_params.cpp:67:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( m_name_buf, m_name.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_params.cpp:69:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( m_name_buf, item );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_param.cpp:44:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( m_name_buf, &m_base );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_param.cpp:46:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( m_name_buf, name );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:84:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( rval, "%s%c%s", dirpath, DIR_DELIM_CHAR, filename );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:86:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( rval, "%s%s", dirpath, filename );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:123:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( rval, "%s%c%s%c", dirpath, DIR_DELIM_CHAR, subdir, DIR_DELIM_CHAR );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:125:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( rval, "%s%c%s", dirpath, DIR_DELIM_CHAR, subdir );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:129:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( rval, "%s%s%c", dirpath, subdir, DIR_DELIM_CHAR );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:131:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( rval, "%s%s", dirpath, subdir );
data/condor-8.6.8~dfsg.1/src/condor_utils/do_connect.unix.cpp:107:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( answer, cptr + 1 );
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:488:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(request, "GET /containers/%s/stats?stream=0 HTTP/1.0\r\n\r\n", container.c_str());
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:518:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		sscanf(response.c_str()+pos, "\"max_usage\":%" SCNu64, &memUsage);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:522:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		sscanf(response.c_str()+pos, "\"tx_bytes\":%" SCNu64, &netOut);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:526:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		sscanf(response.c_str()+pos, "\"rx_bytes\":%" SCNu64, &netIn);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:530:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		sscanf(response.c_str()+pos, "\"usage_in_usermode\":%" SCNu64, &userCpu);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:534:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		sscanf(response.c_str()+pos, "\"usage_in_kernelmode\":%" SCNu64, &sysCpu);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:594:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	int matches = sscanf(data, "%*s %*g%% %lg %s / %*g %*s %*g%% %lg %s / %lg %s", &memRaw, &memUsageUnit[0], &netInRaw, &netInUnit[0], &netOutRaw, &netOutUnit[0]);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1445:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf( old, "%s.%s", filePath.c_str() , timestamp);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1739:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( tail, " errno: %d (%s)", error_code,
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1745:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( tail, buf );
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1893:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf( buf, len, fmt, args );
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_common.cpp:307:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf( fp, fmt, args );
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:127:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(pname, "%s_DEBUG", subsys);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:316:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(pname, "%s_DEBUG", subsys);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:344:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(pname, "%s_LOCK", subsys);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:358:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		(void)sprintf(pname, "%s_LOG_KEEP_OPEN", subsys);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:410:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		(void)sprintf(pname, "%s_LOG", subsys_and_level.c_str());
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:512:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		(void)sprintf(pname, "TRUNC_%s_LOG_ON_OPEN", subsys_and_level.c_str());
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:517:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			(void)sprintf(pname, "%s_LOCK", subsys);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:524:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		(void)sprintf(pname, "MAX_%s_LOG", subsys_and_level.c_str());
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:540:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		(void)sprintf(pname, "MAX_NUM_%s_LOG", subsys_and_level.c_str());
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:191:12:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			int ret=_snprintf(accountname, 100, 
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:205:12:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			int ret=_snprintf(accountname, 100, 
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:820:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( accountname, username);	// Used to add condor-run-, but not anymore.
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:447:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		system(EMAIL_FINAL_COMMAND);
data/condor-8.6.8~dfsg.1/src/condor_utils/email_file.cpp:58:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(file,"%s\\core.%s.WIN32",ptmp,
data/condor-8.6.8~dfsg.1/src/condor_utils/env.cpp:768:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( array[i], var.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/env.cpp:771:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat( array[i], val.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/except.cpp:46:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
{ printf( foo ); }
data/condor-8.6.8~dfsg.1/src/condor_utils/except.cpp:77:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf( buf, fmt, pvar );
data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.cpp:121:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy (
data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.cpp:125:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf ( 
data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.cpp:132:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf ( 
data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.cpp:232:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy ( executable, start );
data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.cpp:246:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy ( arguments, start );
data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.cpp:288:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy ( to, file );
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:723:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(temp_filename, orig);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:728:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(temp_filename, orig);	
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:745:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dest, "%s", "/tmp/condorLocks/" );
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:748:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dest, "%s", path  );
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:757:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(dest+strlen(dest), "%s.lockc", hashVal+4);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:391:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(TmpSpoolSpace,"%s.tmp",SpoolSpace);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:410:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if ( access(ExecFile,F_OK | X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:699:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tempbuf,"%s=\"%s\"",ATTR_TRANSFER_KEY,TransKey);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2606:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ( access(buf.Value(),F_OK) >= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2629:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if( access(newbuf.Value(),F_OK) >= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:4690:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pathbuf,dirbuf);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_xml.cpp:153:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmpParamName, "%s_XMLLOG", daemon_name);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_xml.cpp:166:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(outfilename, "%s/Events.xml", tmp);
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:111:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(file,last_slash);
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:114:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(file,path);
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:152:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buf,path);
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_query.cpp:502:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (x, str);
data/condor-8.6.8~dfsg.1/src/condor_utils/get_daemon_name.cpp:149:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( daemon_name, "%s@%s", tmpname, get_local_fqdn().Value() ); 
data/condor-8.6.8~dfsg.1/src/condor_utils/get_daemon_name.cpp:188:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( ans, "%s@%s", name, get_local_fqdn().Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/getmnt.unix.cpp:134:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( buf, "%s:%s", HOSTNAME, OBJECT );
data/condor-8.6.8~dfsg.1/src/condor_utils/getmnt.unix.cpp:136:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( buf, OBJECT );
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:548:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(&(result_string[result_string_len]), x509_fqan_escape_sub);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:551:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(&(result_string[result_string_len]), x509_fqan_delimiter_sub);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:923:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(retfqan, tmp_scan_ptr);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:930:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(&(retfqan[fqan_len]), x509_fqan_delimiter);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:934:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(&(retfqan[fqan_len]), tmp_scan_ptr);
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:301:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int status = system( command.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:369:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	status = system( command.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:376:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	status = system( command.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:389:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int status = system( command );
data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp:115:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(p, BaseJobHistoryFileName);
data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp:116:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(p + cchBaseFileName, ext);
data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp:122:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(p, BaseJobHistoryFileName);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:265:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(expr, "%s = %s", ATTR_CLUSTER_ID, cid);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:275:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(expr, "%s = %s", ATTR_PROC_ID, pid);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:292:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(expr, "%s = %s", attr, val);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:372:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(expr, "%s = %s", attr, val);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:779:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buf, my_ip_string());
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:782:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buf, inet_ntoa(inaddr));
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:96:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buffer, "T%02d%02d%02d%s", 
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:99:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buffer, "T%02d:%02d:%02d%s", 
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:104:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buffer, "%04d%02d%02dT%02d%02d%02d%s", 
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:107:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buffer, "%04d-%02d-%02dT%02d:%02d:%02d%s", 
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:118:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(query, "select lastupdate from currencies where datasource = \'%s\'", schedd);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:189:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cluster_id, cid);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:227:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(expr, "%s = %s", attr, val);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:244:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(expr, "%s = %s", temp, val);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:387:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(expr, "%s = %s", attr, val);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:405:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(expr, "%s = %s", attr, val);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:423:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(expr, "%s = %ld", ATTR_SERVER_TIME, (long)time(NULL));
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:160:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(searchLogName, "%s.*", (const char*)logBaseName);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:198:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf( rotated_log_name, "%s.%s", logBaseName, ts );
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:222:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			(void)sprintf( empty, "%s.old", logBaseName );
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:320:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	(void)sprintf(result, "%s%c%s", dirName, DIR_DELIM_CHAR, oldFile);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:357:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(oldFile, "%s%c%s", dirName, DIR_DELIM_CHAR, ffd.cFileName);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:361:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(oldFile, "%s%c%s", dirName, DIR_DELIM_CHAR, ffd.cFileName);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:138:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
		wcscpy(new_buffer, this->Data_string);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:146:2:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	wcscat(new_buffer, Login );
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:150:2:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	wcscat(new_buffer, Passwd );
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:206:4:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			wcscat(newData, result);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:490:2:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	wcscat(look_for, Login );
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:517:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
		wcscpy(h_lwr, haystack);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:518:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
		wcscpy(n_lwr, needle);
data/condor-8.6.8~dfsg.1/src/condor_utils/metric_units.cpp:44:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buffer, "%.1f %s", value, suffix[power] );
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:564:4:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execvp(cmd.Value(), const_cast<char *const*>(args) );
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:923:3:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execv( cmd, const_cast<char *const*>(argv) );
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.cpp:221:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( str, tmp );
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:521:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( Account_name, accountname );
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:526:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( Domain_name, domain );
data/condor-8.6.8~dfsg.1/src/condor_utils/pgsqldatabase.cpp:54:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(con_str, connect);
data/condor-8.6.8~dfsg.1/src/condor_utils/profile.WINDOWS.cpp:881:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf ( 
data/condor-8.6.8~dfsg.1/src/condor_utils/read_multiple_logs.cpp:628:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if ( access( filename.Value(), F_OK ) != 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:793:4:  [4] (buffer) lstrcpyW:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   lstrcpyW(psz, pszPath);
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:804:7:  [4] (buffer) lstrcpyW:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      lstrcpyW(pszNext, pszPattern);
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:891:13:  [4] (buffer) lstrcpyW:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            lstrcpyW(pszNext, wfd.cFileName); 
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:910:7:  [4] (buffer) lstrcpyW:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      lstrcpyW(pszNext, L"*");
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:941:10:  [4] (buffer) lstrcpyW:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         lstrcpyW(pszNext, pdir->wfd.cFileName); 
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:1279:4:  [4] (buffer) lstrcpyW:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   lstrcpyW(szFullPath, szPre);
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:71:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s=%s", key, value);
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:88:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(ad_struct->__ptr[attr_index].value, GetMyTypeName(*curr_ad));
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:98:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(ad_struct->__ptr[attr_index].value, GetTargetTypeName(*curr_ad));
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:110:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ad_struct->__ptr[attr_index].value, timeString.Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:148:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(ad_struct->__ptr[attr_index].value,str);
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:183:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( tmpstr, ExprTreeToString( tree ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:199:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(ad_struct->__ptr[attr_index].name, name);
data/condor-8.6.8~dfsg.1/src/condor_utils/spooled_job_files.cpp:98:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if ( ickpt && access( ickpt, F_OK | X_OK ) >= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:262:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(declare_cursor_str, 
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:274:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(declare_cursor_str, 
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:286:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(declare_cursor_str, 
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:299:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(declare_cursor_str, 
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:312:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    	sprintf(declare_cursor_str, 
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:325:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    	sprintf(declare_cursor_str, 
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:339:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(declare_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:353:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(declare_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:368:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(declare_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:384:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(declare_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:402:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		  sprintf(query_str, quill_avg_time_template_pgsql);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:63:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(hostKeyFile, "%s-host", privKeyFile);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:93:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(command, "%s %s %s > /dev/null 2>&1 < /dev/null", keygen, args, privateKey);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:98:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int ret = system(command);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:198:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "-p%d -oAuthorizedKeysFile=%s -h%s %s", port, pubKeyFile, hostKeyFile, rawArgs);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:284:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s -q -B -P %d -i %s -oStrictHostKeyChecking=no -oUserKnownHostsFile=%s %s %s %s:%s > %s 2>&1 < %s", scp, port, privKeyFile, NULL_FILE, privKeyFile, contactFileSrc, dstHost, dir, NULL_FILE, NULL_FILE);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:289:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	int r = system(buf);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:320:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%d %s %s %s\n", node, (copy + 1), username, dir);
data/condor-8.6.8~dfsg.1/src/condor_utils/stat_info.cpp:283:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( rval, "%s", dir );
data/condor-8.6.8~dfsg.1/src/condor_utils/stat_info.cpp:287:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( rval, "%s%c", dir, DIR_DELIM_CHAR );
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:57:6:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	n = vsnprintf(fixbuf, fixlen, format, pargs);    
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:60:6:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	n = vsnprintf(fixbuf, fixlen, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:85:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int nn = vsnprintf(varbuf, n, format, pargs);
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:88:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	int nn = vsnprintf(varbuf, n, format, args);
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:71:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(ccfilename, "%s%c%s.cc", cred_dir, DIR_DELIM_CHAR, username);
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:84:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmpfilename, "%s%c%s.cred.tmp", cred_dir, DIR_DELIM_CHAR, username);
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:85:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(filename, "%s%c%s.cred", cred_dir, DIR_DELIM_CHAR, username);
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:581:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( buf, tmp );
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:585:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(buf, delim);
data/condor-8.6.8~dfsg.1/src/condor_utils/strnewp.cpp:28:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return( newstr ? strcpy( newstr, str ) : (char*) 0 );
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_glob.cpp:382:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(item+cchdir, wfd.cFileName);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:240:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if (Def.psz) strcpy(NewDef->psz, Def.psz);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:347:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		vsprintf ( message, format, ap );
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:368:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		vsprintf ( message, format, ap );
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:2505:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if( access(rootdir, F_OK|X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:2583:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(iwd.Value(), F_OK|X_OK) < 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:2592:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if( access(pathname.Value(), F_OK|X_OK) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/subsystem_info.cpp:493:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
SubsystemInfo::printf( void ) const
data/condor-8.6.8~dfsg.1/src/condor_utils/subsystem_info.h:141:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	void printf( void ) const;
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:132:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
				if ( sscanf(  lpDeviceName, 
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:140:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat( lpDeviceName, lpSharedName );
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:194:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
			if ( sscanf(  lpDeviceName, 
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:202:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat( lpDeviceName, lpSharedName );
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:204:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( lpDeviceName, lpFsFileName + 2 );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:287:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(serverTimeStr, "%s = %ld", ATTR_SERVER_TIME, (long)time(NULL) );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_get_exec_path.cpp:77:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp( "test_get_exec_path", argv );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_get_exec_path.cpp:91:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( stderr, fmt, args );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:388:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(expression, "%s = \"%s\"", variable, string);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:4368:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(*quoted_string, "\"%s\"", *string);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:73:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = %d", ATTR_COMPLETION_DATE, 10); /* non zero */
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:120:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = %d", ATTR_COMPLETION_DATE, 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:164:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = 42", ATTR_TOTAL_SUSPENSIONS);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:166:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TotalSuspensions == 42", ATTR_PERIODIC_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:168:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:170:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_ON_EXIT_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:172:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TRUE", ATTR_ON_EXIT_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:220:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = 42", ATTR_TOTAL_SUSPENSIONS);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:222:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:224:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TotalSuspensions == 42", ATTR_PERIODIC_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:226:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_ON_EXIT_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:228:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TRUE", ATTR_ON_EXIT_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:276:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = 40", ATTR_TOTAL_SUSPENSIONS);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:278:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TotalSuspensions == 42", ATTR_PERIODIC_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:280:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:282:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_ON_EXIT_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:284:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TRUE", ATTR_ON_EXIT_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:326:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = 40", ATTR_TOTAL_SUSPENSIONS);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:328:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:330:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TotalSuspensions == 42", ATTR_PERIODIC_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:332:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_ON_EXIT_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:334:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TRUE", ATTR_ON_EXIT_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:376:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = %d", ATTR_ON_EXIT_CODE, 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:378:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = 42", ATTR_TOTAL_SUSPENSIONS);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:380:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = False", ATTR_PERIODIC_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:382:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:384:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TotalSuspensions == 42", ATTR_ON_EXIT_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:386:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TRUE", ATTR_ON_EXIT_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:433:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = %d", ATTR_ON_EXIT_CODE, 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:435:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = 42", ATTR_TOTAL_SUSPENSIONS);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:437:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:439:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:441:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_ON_EXIT_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:443:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TotalSuspensions == 42", ATTR_ON_EXIT_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:490:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = %d", ATTR_ON_EXIT_CODE, 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:492:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = 40", ATTR_TOTAL_SUSPENSIONS);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:494:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:496:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:498:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TotalSuspensions == 42", ATTR_ON_EXIT_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:500:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TRUE", ATTR_ON_EXIT_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:556:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = %d", ATTR_ON_EXIT_CODE, 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:558:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = 40", ATTR_TOTAL_SUSPENSIONS);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:560:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:562:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_PERIODIC_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:564:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_ON_EXIT_HOLD_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:566:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = TotalSuspensions == 42", ATTR_ON_EXIT_REMOVE_CHECK);
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:801:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, "%s/%s", p1, p2);
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:808:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( buf, "%s", p1 );
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:841:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s_%s", id, attr );
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:855:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( buf, "%s_%s", id, attr );
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:471:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(user, "%s", username);
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:472:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dom, "%s", domain);
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:715:12:  [4] (access) ImpersonateLoggedOnUser:
  If this call fails, the program could fail to drop heightened privileges
  (CWE-250). Make sure the return value is checked, and do not continue if a
  failure is reported.
				if ( ! ImpersonateLoggedOnUser(CurrUserHandle)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:783:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(CondorUserName, "%s/%s",szDomainName,szAccountName);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_error_policy.dead.cpp:156:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		error.sprintf( "ErrorPolicy: Job %d.%d does not have a state!\n",
data/condor-8.6.8~dfsg.1/src/condor_utils/user_error_policy.dead.cpp:280:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			error.sprintf( "ErrorPolicy: "
data/condor-8.6.8~dfsg.1/src/condor_utils/user_error_policy.dead.cpp:351:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		reason.sprintf( "The job attribute %s was set to %s. "
data/condor-8.6.8~dfsg.1/src/condor_utils/user_error_policy.dead.cpp:357:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		reason.sprintf( "The job attribute %s evaluated to %s.",
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:88:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_TAKE_ACTION);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:90:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s = FALSE", ATTR_USER_POLICY_ERROR);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:103:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, "%s = TRUE", ATTR_USER_POLICY_ERROR);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:105:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, "%s = %u", ATTR_USER_ERROR_REASON, 
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:130:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, "%s = TRUE", ATTR_USER_POLICY_ERROR);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:132:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, "%s = %u", ATTR_USER_ERROR_REASON, 
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:143:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = TRUE", ATTR_TAKE_ACTION);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:145:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = %d", ATTR_USER_POLICY_ACTION, REMOVE_JOB);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:147:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = \"%s\"", ATTR_USER_POLICY_FIRING_EXPR, 
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:179:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = TRUE", ATTR_TAKE_ACTION);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:181:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = %d", ATTR_USER_POLICY_ACTION, HOLD_JOB);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:183:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = \"%s\"", ATTR_USER_POLICY_FIRING_EXPR, 
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:195:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = TRUE", ATTR_TAKE_ACTION);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:197:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = %d", ATTR_USER_POLICY_ACTION, REMOVE_JOB);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:199:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = \"%s\"", ATTR_USER_POLICY_FIRING_EXPR, 
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:211:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = TRUE", ATTR_TAKE_ACTION);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:213:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = %d", ATTR_USER_POLICY_ACTION, REMOVE_JOB);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:215:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = \"%s\"", ATTR_USER_POLICY_FIRING_EXPR, 
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:241:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = TRUE", ATTR_TAKE_ACTION);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:243:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = %d", ATTR_USER_POLICY_ACTION, HOLD_JOB);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:245:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = \"%s\"", ATTR_USER_POLICY_FIRING_EXPR, 
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:258:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = TRUE", ATTR_TAKE_ACTION);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:260:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = %d", ATTR_USER_POLICY_ACTION, REMOVE_JOB);
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:262:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buf, "%s = \"%s\"", ATTR_USER_POLICY_FIRING_EXPR, 
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:794:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(param_sub, policy_name); strcat(param_sub, "_SUBCODE");
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:803:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(param_sub, policy_name); strcat(param_sub, "_REASON");
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:290:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		vsprintf ( message, format, ap );
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:311:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		vsprintf ( message, format, ap );
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp:139:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int ret = access(file, R_OK);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp:162:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int ret = access(file, W_OK);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp:185:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int ret = access(file, X_OK);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp:404:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	output.vsprintf(fmt, args);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp:699:6:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    execvp(cmd.Value(), args_array);
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:270:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vprintf(format, ap);
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:2176:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(command_argv[iargv],buf);
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:2191:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(command_argv[iargv],buf);
data/condor-8.6.8~dfsg.1/src/deployment_tools/uniq_pid_tool_main.cpp:199:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, MIDWIFE_USAGE);
data/condor-8.6.8~dfsg.1/src/deployment_tools/uniq_pid_tool_main.cpp:252:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if( execvp(argv[0], argv) == -1 ){
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:238:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int ret = access(file, R_OK);
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:238:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int ret = access(file, R_OK);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:297:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	actual = vsnprintf(buf, sizeof(buf)/sizeof(buf[0]), format, ap);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:535:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d %s", gram_arg->req_id, operation_fc,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:609:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d %d %d", gram_arg->req_id, operation_fc,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:668:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d %d %d", gram_arg->req_id, operation_fc,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:727:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d", gram_arg->req_id, operation_fc);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:847:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d %s", req_id, result,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:916:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d %d %d", gram_arg->req_id, operation_fc,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:975:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d", gram_arg->req_id, operation_fc);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1055:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d", gram_arg->req_id, operation_fc);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1118:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %d", gram_arg->req_id,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1125:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat( output, entry->attribute );
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1128:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat( output, esc_str );
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1163:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(saved_req_id, req_id);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1190:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(output, "%s %s %d %d", (char *)callback_arg,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1322:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(environ_variable, file_name); 
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1557:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf_value,"X509_USER_PROXY=%s",file_name);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1719:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(command_argv[iargv],buf);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1729:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(command_argv[iargv],buf);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:876:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*outpath, inpath);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:391:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( &dst->data[dst->length], src );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:409:13:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		ret_val = vprintf(format, ap);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:849:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( output, "%s 1 NULL %s", input_line[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:912:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( url, "gsiftp://%s/jobs/new", user_arg->cmd[2] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:954:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( (char *)user_arg->buff, job_id );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:956:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( url, "gsiftp://%s/jobs/new/job", user_arg->cmd[2] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1014:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( url, "gsiftp://%s/jobs", user_arg->cmd[2] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1036:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 0 %s NULL", user_arg->cmd[1],
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1043:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 NULL %s", user_arg->cmd[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1090:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( url, "gsiftp://%s/jobs/info/%s/status",
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1175:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 0 %s NULL", user_arg->cmd[1],
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1182:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 NULL %s", user_arg->cmd[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1230:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( url, "gsiftp://%s/jobs/%s", user_arg->cmd[2],
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1252:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 0 NULL", user_arg->cmd[1] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1258:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 %s", user_arg->cmd[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1316:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( url, "gsiftp://%s/jobs/%s/%s", user_arg->cmd[2],
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1376:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( url, "gsiftp://%s/jobs/%s/%s",
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1400:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 0 NULL", user_arg->cmd[1] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1408:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 %s", user_arg->cmd[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1608:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( url, "gsiftp://%s/jobs/%s/%s",
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1640:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 0 NULL", user_arg->cmd[1] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1648:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 %s", user_arg->cmd[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1776:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( url, "gsiftp://%s/jobs/info/%s/diag",
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1901:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( output, "%s 1 0 0 0 0 0 %s", user_arg->cmd[1],
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1945:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( output, "%s 1 0 0 0 0 0 %s", user_arg->cmd[1],
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1960:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 0 %d %d %s %s %s NULL",
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1970:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 0 0 0 0 0 %s", user_arg->cmd[1],
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2020:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( url, "gsiftp://%s/jobs", user_arg->cmd[2] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2041:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 0 NULL", user_arg->cmd[1] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2047:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 %s", user_arg->cmd[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2199:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 %s", user_arg->cmd[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2232:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( server, "%s:%d", url.host, url.port );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2234:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( server, "%s", url.host );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2245:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( server, "%s:%d", url.host, url.port );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2247:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( server, "%s", url.host );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2480:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 0 NULL", user_arg->cmd[1] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2486:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( output, "%s 1 %s", user_arg->cmd[1], esc );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2835:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf_value,"X509_USER_PROXY=%s",file_name);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:3024:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(command_argv[iargv],buf);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:3040:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(command_argv[iargv],buf);
data/condor-8.6.8~dfsg.1/src/python-bindings/python_bindings_common.h:44:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
 #undef snprintf
data/condor-8.6.8~dfsg.1/src/python-bindings/python_bindings_common.h:45:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
 #undef vsnprintf
data/condor-8.6.8~dfsg.1/src/classad/classad/fnCall.h:208:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	static bool random(const char*,const ArgumentList&,EvalState&,Value&);
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:172:48:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        functionTable["random"      ] = (void*)random;
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:2330:1:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
random( const char*,const ArgumentList &argList,EvalState &state,
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:168:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(42);
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:219:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(42);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:40:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand(seed);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:57:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return (int) (lrand48() & INT_MAX);
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:54:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand( time( NULL ) );
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/WindowsMessageReceiver.cpp:76:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(li.LowPart);
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:243:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (!(default_filename = getenv("_CONDOR_CHIRP_CONFIG"))) {
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:97:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((default_filename = getenv("_CONDOR_CHIRP_CONFIG"))) {
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:100:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if (NULL == (dir = getenv("_CONDOR_SCRATCH_DIR"))) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:106:2:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
	tmpnam(local_filename);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:2250:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	ptr = getenv( "CONDOR_STACK_SIZE" );
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1118:3:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srandom(time(NULL));
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1121:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	int first_peer = (int)(random()%(long)num_peers);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2251:6:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (realpath(path, real_path) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2258:6:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (realpath(ckpt_server_dir, real_ckpt_server_dir) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryProviderFactory.cpp:51:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    else if ((tmp = getenv("WSFCPP_HOME"))) {
data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/trigger_config.cpp:249:24:  [3] (buffer) getopt_long:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while (-1 != (opt = getopt_long(argc, argv, "adil", long_opts, &index)))
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:274:2:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	InitializeCriticalSection(&Big_fat_mutex);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:275:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(&Big_fat_mutex);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:2331:4:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	::EnterCriticalSection(&Big_fat_mutex); // grab the big fat mutex before we write
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:3648:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
		EnterCriticalSection(&Big_fat_mutex);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:7616:17:  [3] (shell) CreateProcessAsUser:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Especially watch out for embedded spaces.
		cp_result = ::CreateProcessAsUser(user_token,bIs16Bit ? NULL : executable,
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:9293:4:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	::EnterCriticalSection(&(entry->crit_section));
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:9362:6:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
			::EnterCriticalSection(&Big_fat_mutex); // enter big fat mutex
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:9505:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
		::EnterCriticalSection(&(entry->crit_section));
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:9541:4:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	::InitializeCriticalSection(&(entry->crit_section));
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:2391:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char* env = getenv( env_name );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:429:28:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    HMODULE hModImagehlp = LoadLibrary( _T("IMAGEHLP.DLL") );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.cpp:67:4:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	::EnterCriticalSection(&Big_fat_mutex); // enter big fat mutex
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp:35:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
#define realpath(P,B) _fullpath((B),(P),_MAX_PATH)
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp:533:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  if (realpath(web_root_dir, buf)) {
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp:544:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  if (realpath(full_name, buf)) {
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_dagman_metrics_reporter.cpp:163:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char* env_metrics_server = getenv( "PEGASUS_USER_METRICS_SERVER" );
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_dagman_metrics_reporter.cpp:199:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char* default_metrics_server = getenv( "PEGASUS_USER_METRICS_DEFAULT_SERVER" );
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:651:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	dagman.DAGManJobId.SetFromString( getenv( EnvGetName( ENV_ID ) ) );
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_metrics.cpp:77:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *tmp = getenv( "PEGASUS_METRICS" );
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_metrics.cpp:370:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *filename = getenv( "PEGASUS_BRAINDUMP_FILE" );
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/dllmain.cpp:33:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
		InitializeCriticalSection(&hdfsHashMutex);
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/dllmain.cpp:34:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
		InitializeCriticalSection(&jvmMutex);
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.cpp:414:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		hadoopClassPath = getenv("CLASSPATH");
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.cpp:429:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		hadoopJvmArgs = getenv("LIBHDFS_OPTS");
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.h:41:27:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define LOCK_HASH_TABLE() EnterCriticalSection(&hdfsHashMutex)
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.h:43:26:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define LOCK_JVM_MUTEX() EnterCriticalSection(&jvmMutex)
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:224:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	m_failure_injection = getenv( "GM_FAILURE_INJECTION" );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp:164:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	m_failure_injection = getenv( "GM_FAILURE_INJECTION" );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.cpp:304:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *val = getenv( "SCHEDD_NAME" );
data/condor-8.6.8~dfsg.1/src/condor_had/ReplicatorStateMachine.cpp:57:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   	srand( time( NULL ) );
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:60:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(time(NULL));
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:105:2:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	InitializeCriticalSection(&received_lock);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:106:2:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	InitializeCriticalSection(&kill_lock);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:184:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
		EnterCriticalSection(&kill_lock);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:528:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
		EnterCriticalSection(&kill_lock);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:604:4:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
			EnterCriticalSection(&received_lock);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:946:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(&received_lock);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:1536:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char * known_dir = getenv("CONDOR_PRIVATE_SHARED_PORT_COOKIE");
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:259:26:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	if ( (_condor_hSecDll = LoadLibrary( "security.dll" )) == NULL ) {
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:279:21:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	BOOL exec_status = CreateProcess( NULL, shutdown_program, NULL, NULL, TRUE, DETACHED_PROCESS | CREATE_SUSPENDED, NULL, NULL, &si, &pi );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:279:21:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	BOOL exec_status = CreateProcess( NULL, shutdown_program, NULL, NULL, TRUE, DETACHED_PROCESS | CREATE_SUSPENDED, NULL, NULL, &si, &pi );
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:533:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *tz = getenv(tz_name);
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:498:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	use_pss = getenv("_condor_USE_PSS");
data/condor-8.6.8~dfsg.1/src/condor_release/examples/dagman/random.c:32:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand( (unsigned int)time );
data/condor-8.6.8~dfsg.1/src/condor_rmdir/harylist.h:61:31:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define HaryList_Lock(hlst)   EnterCriticalSection(&PCARYLIST_PTR(hlst)->cs)
data/condor-8.6.8~dfsg.1/src/condor_rmdir/harylist.h:400:9:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
        InitializeCriticalSection(&plst->cs);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/harylist.h:445:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection(&plst->cs);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/harylist.h:486:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection(&plst->cs);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/harylist.h:530:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
		EnterCriticalSection(&plst->cs);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:9507:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char* tempdir = getenv("TEMP");
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:34:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *procno_str = getenv("_CONDOR_PROCNO");
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:380:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	scheddName = getenv( EnvGetName( ENV_SCHEDD_NAME ) );
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Resource.cpp:2485:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    death_time_string   = getenv(death_time_env_name);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:65:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
#define realpath(path,resolved_path) _fullpath((resolved_path),(path),_MAX_PATH)
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:902:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	if (!realpath(iwd.c_str(), &real_iwd[0]))
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1079:8:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		if (!realpath(it->c_str(), &(real_filename[0])))
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1892:23:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			HINSTANCE advapi = LoadLibrary("ADVAPI32.dll");
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_pid_ns_init.cpp:72:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *filename = getenv("_CONDOR_PID_NS_INIT_STATUS_FILENAME");
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_pid_ns_init.cpp:90:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	unlink(getenv("_CONDOR_PID_NS_INIT_STATUS_FILENAME"));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_pid_ns_init.cpp:146:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		result = stat(getenv("_CONDOR_PID_NS_INIT_STATUS_FILENAME"), &buf);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_rsh.cpp:79:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *shadow = getenv( envName );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.cpp:125:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        tmp = getenv( "PATH" );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.cpp:138:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *condor_config = getenv( "CONDOR_CONFIG");
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_master_proc.cpp:164:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        tmp = getenv( "PATH" );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.cpp:136:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        tmp = getenv( "PATH" );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.cpp:150:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *condor_config = getenv( "CONDOR_CONFIG");
data/condor-8.6.8~dfsg.1/src/condor_starter.std/driver.cpp:60:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		answer = bar.getenv(buf);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:298:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(&cs);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:385:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
		EnterCriticalSection(&cs);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:432:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
		InitializeCriticalSection(&cs);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:469:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(&cs);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/getcwd.c:32:7:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
char* getwd( char* );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/getcwd.c:44:1:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
getwd( char *path )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/getcwd.c:109:12:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
REMAP_ONE( getwd, _getwd, char *, char * )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/getcwd.c:110:12:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
REMAP_ONE( getwd, __getwd, char *, char * )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_startup.c:487:8:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
		wd = getwd(0);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/special_stubs.cpp:122:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ( (low = getenv("_condor_LOWPORT")) == NULL ) {
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/special_stubs.cpp:126:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ( (high = getenv("_condor_HIGHPORT")) == NULL ) {
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/special_stubs.cpp:151:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if( (tmp = getenv("_condor_BIND_ALL_INTERFACES")) == NULL ) {
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:145:12:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
REMAP_ONE( chroot, __chroot, int , const char *)
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:523:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	return realpath(buf, resolved);
data/condor-8.6.8~dfsg.1/src/condor_tests/appendmsg.cpp:353:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      ;RDRAND instruction = Set random value into EAX. Will set overflow [C] flag if success
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async-compressed_std.c:48:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(0));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async_std.c:48:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(0));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c:148:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(0);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c:221:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(0);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_memory-file_std.cpp:155:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand( random_key );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_bigenv.c:79:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	value = getenv(variable_name);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:200:13:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
	if ((buf = tmpnam(space)) == NULL) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_zero-calloc_std.c:52:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(0); 
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:810:17:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			ocl_handle = LoadLibrary(opencl_library);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:817:17:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		cuda_handle = LoadLibrary(cudart_library);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:819:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			cuda_handle = LoadLibrary("nvcuda.dll");
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:836:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			nvml_handle = LoadLibrary(nvml_library);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:32:9:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
#define tempnam  _tempnam
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:602:35:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
	if ( NULL == ( config_file_tmp = tempnam(".", Config_file)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:182:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	m_shells = getenv("SHELL");
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:620:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char const *temp_dir = getenv("TMP");
data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp:227:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(Seed);
data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp:42:2:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
	tmpnam(tmpfile);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_HashTable.cpp:477:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((unsigned)time(0));
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_HashTable.cpp:485:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		table_two->remove(random);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/ring_buffer_tests.cpp:348:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(777);
data/condor-8.6.8~dfsg.1/src/condor_utils/LoadPlugins.cpp:125:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        if( NULL == LoadLibrary(plugin_file) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/access_desktop.WINDOWS.cpp:963:8:  [3] (misc) AddAccessAllowedAce:
  This doesn't set the inheritance bits in the access control entry (ACE)
  header (CWE-732). Make sure that you set inheritance by hand if you wish it
  to inherit.
		if (!AddAccessAllowedAce(
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:97:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
#define realpath(path,resolved_path) _fullpath((resolved_path),(path),_MAX_PATH)
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:966:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char* env = getenv( EnvGetName(ENV_CONFIG) );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1521:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char * pw_dir = getenv("USERPROFILE");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1526:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		const char * pw_dir = getenv("HOME");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1553:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if( env_name && (env = getenv( env_name )) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:3638:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		if ((real_path = realpath(p.Value(),NULL))) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:509:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		scheddname = getenv( EnvGetName( ENV_SCHEDD_NAME ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1732:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		scheddname = getenv( EnvGetName( ENV_SCHEDD_NAME ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:91:2:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	InitializeCriticalSection(mv);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:105:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(mv);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:145:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&(cv->waiters_count_lock_));
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:170:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection (&cv->waiters_count_lock_);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:183:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection (&cv->waiters_count_lock_);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:197:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection (external_mutex);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:206:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection (&cv->waiters_count_lock_);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:220:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection (&cv->waiters_count_lock_);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2916:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			tvalue = getenv(name);
data/condor-8.6.8~dfsg.1/src/condor_utils/directory.WINDOWS.cpp:2169:21:  [3] (misc) AddAccessAllowedAce:
  This doesn't set the inheritance bits in the access control entry (ACE)
  header (CWE-732). Make sure that you set inheritance by hand if you wish it
  to inherit.
            added = AddAccessAllowedAce (
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:851:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
		InitializeCriticalSection(_condor_dprintf_critsec);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:853:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(_condor_dprintf_critsec);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1629:1:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
getenv( name )
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:720:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	temp_filename = realpath(orig, buffer);
data/condor-8.6.8~dfsg.1/src/condor_utils/filesystem_remap.cpp:510:18:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
			if ((retval = chroot(it->first.c_str()))) {
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:220:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	path = realpath( buf, full_buf );
data/condor-8.6.8~dfsg.1/src/condor_utils/get_random_num.cpp:38:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(seed);
data/condor-8.6.8~dfsg.1/src/condor_utils/get_random_num.cpp:58:16:  [3] (random) lrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return (int) (lrand48() & INT_MAX);
data/condor-8.6.8~dfsg.1/src/condor_utils/get_random_num.cpp:73:17:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return (float) drand48();
data/condor-8.6.8~dfsg.1/src/condor_utils/get_random_num.cpp:87:12:  [3] (random) drand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return drand48();
data/condor-8.6.8~dfsg.1/src/condor_utils/load_dll.WINDOWS.cpp:48:9:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	_dll = LoadLibrary ( name );
data/condor-8.6.8~dfsg.1/src/condor_utils/my_getopt.cpp:53:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if(getenv("POSIXLY_CORRECT")) colon_mode = mode = '+';
data/condor-8.6.8~dfsg.1/src/condor_utils/my_getopt.cpp:149:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if(getenv("POSIXLY_CORRECT")) colon_mode = mode = '+';
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:197:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	result = CreateProcess(NULL,                   // determine app from cmd line
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:197:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	result = CreateProcess(NULL,                   // determine app from cmd line
data/condor-8.6.8~dfsg.1/src/condor_utils/ntsysinfo.WINDOWS.cpp:56:12:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		hNtDll = LoadLibrary("ntdll.dll");
data/condor-8.6.8~dfsg.1/src/condor_utils/ntsysinfo.WINDOWS.cpp:102:19:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			hKernel32Dll = LoadLibrary("kernel32.dll");
data/condor-8.6.8~dfsg.1/src/condor_utils/open_files_in_pid.cpp:35:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		file = realpath(file.Value(), f);
data/condor-8.6.8~dfsg.1/src/condor_utils/process_control.WINDOWS.cpp:85:6:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (CreateProcess(NULL,         // get the executable from the command line
data/condor-8.6.8~dfsg.1/src/condor_utils/process_control.WINDOWS.cpp:85:6:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (CreateProcess(NULL,         // get the executable from the command line
data/condor-8.6.8~dfsg.1/src/condor_utils/read_multiple_logs.cpp:36:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
#define realpath(path,resolved_path) _fullpath((resolved_path),(path),_MAX_PATH)
data/condor-8.6.8~dfsg.1/src/condor_utils/read_multiple_logs.cpp:638:22:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	char *tmpRealPath = realpath( filename.Value(), NULL );
data/condor-8.6.8~dfsg.1/src/condor_utils/remote_close.WINDOWS.cpp:62:27:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        kernel32_module = LoadLibrary ( "kernel32.dll" );
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:183:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	return getenv( env_var );
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:226:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	result = getenv( env_var );
data/condor-8.6.8~dfsg.1/src/condor_utils/systemd_manager.cpp:50:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *tmp_val = getenv("NOTIFY_SOCKET");
data/condor-8.6.8~dfsg.1/src/condor_utils/systemd_manager.cpp:52:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((tmp_val = getenv("WATCHDOG_USEC")))
data/condor-8.6.8~dfsg.1/src/condor_utils/test.cpp:120:4:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srandom( getpid() );
data/condor-8.6.8~dfsg.1/src/condor_utils/test.cpp:121:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			usec = random() % 1000000;
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:967:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if( (env_val = getenv(envName)) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/which.cpp:49:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	MyString strPath = getenv( EnvGetName( ENV_PATH ) );
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_main.cpp:144:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	user_uid = getenv("VMGAHP_USER_UID");
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_main.cpp:151:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			user_gid = getenv("VMGAHP_USER_GID");
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_main.cpp:356:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		vmtype = getenv("VMGAHP_VMTYPE");
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_main.cpp:362:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		workingdir = getenv("VMGAHP_WORKING_DIR");
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1315:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			char * env = getenv(env_name);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1335:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char * env = getenv(env_name);
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:2379:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *worker_env = getenv( "CREAM_GAHP_WORKER_THREADS" );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:1097:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char * x509_ca_dir = getenv( "X509_CERT_DIR" );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:1102:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char * x509_ca_file = getenv( "X509_CERT_FILE" );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:1108:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char * soap_ssl_ca_dir = getenv( "SOAP_SSL_CA_DIR" );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:1115:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char * soap_ssl_ca_file = getenv( "SOAP_SSL_CA_FILE" );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:1175:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char * failureMode = getenv( "EC2_GAHP_FAILURE_MODE" );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp:219:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char * debug_string = getenv( "DebugLevel" );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp:229:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	buff = getenv(AMAZON_HTTP_PROXY);
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:657:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	ca_dir = getenv( "X509_CERT_DIR" );
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:659:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		ca_dir = getenv( "SOAP_SSL_CA_DIR" );
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:662:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	ca_file = getenv( "X509_CERT_FILE" );
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:664:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		ca_file = getenv( "SOAP_SSL_CA_FILE" );
data/condor-8.6.8~dfsg.1/src/gce_gahp/io_loop_pthread.cpp:139:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char * debug_string = getenv( "DebugLevel" );
data/condor-8.6.8~dfsg.1/src/gce_gahp/io_loop_pthread.cpp:182:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	buff = getenv(GCE_HTTP_PROXY);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2590:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	environ_variable = getenv("X509_USER_PROXY");
data/condor-8.6.8~dfsg.1/src/pandad/main.cpp:50:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char * debug_string = getenv( "DebugLevel" );
data/condor-8.6.8~dfsg.1/src/python-bindings/dc_tool.cpp:154:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char *inherit_var = getenv("CONDOR_INHERIT");
data/condor-8.6.8~dfsg.1/src/python-bindings/module_lock.cpp:124:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        m_proxy_orig = getenv("X509_USER_PROXY");
data/condor-8.6.8~dfsg.1/src/python-bindings/module_lock.h:9:34:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  #define MODULE_LOCK_MUTEX_LOCK EnterCriticalSection
data/condor-8.6.8~dfsg.1/src/python-bindings/module_lock.h:11:45:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  #define MODULE_LOCK_MUTEX_INITIALIZE(mtx) InitializeCriticalSection(mtx)
data/condor-8.6.8~dfsg.1/debian/dmtcp/foo.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/condor-8.6.8~dfsg.1/debian/dmtcp/foo.c:16:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		delay = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/debian/dmtcp/foo.c:20:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		delay = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/debian/dmtcp/foo.c:30:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout = fopen(file, "a");
data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char num_string[10];
data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C:304:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(num_string, "%d\n", (current_list+1) * 3);
data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C:362:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(num_string, "%d\n", (current_list+1) * 3);
data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C:465:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(num_string, "%d\n", (current_list+1) * 3);
data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C:472:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  						sprintf(num_string, "%d. ", 
data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C:488:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
								sprintf(num_string, "%d\n", current_list * 3);
data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C:492:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
								sprintf(num_string, "%d\n", (current_list+1) * 3);
data/condor-8.6.8~dfsg.1/doc/makeman/makeman.C:509:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  					sprintf(num_string, "%d\n", (current_list+1) * 3);
data/condor-8.6.8~dfsg.1/externals/bundles/krb5/1.4.3-p1/win-mac.post.h:178:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define THREEPARAMOPEN(x,y,z) open(x,y,z)
data/condor-8.6.8~dfsg.1/externals/bundles/krb5/1.4.3-p1/win-mac.pre.h:178:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define THREEPARAMOPEN(x,y,z) open(x,y,z)
data/condor-8.6.8~dfsg.1/src/annexd/annexd.cpp:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_str[37];
data/condor-8.6.8~dfsg.1/src/annexd/annexd.cpp:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[ 4 + 1 + 2 + 1 + 2 + 1 /* T */ + 2 + 1 + 2 + 1 + 2 + 1 /* Z */ + 1];
data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.cpp:1279:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.cpp:1286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ip[128],ccbid_str[128],cookie_str[128];
data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.h:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_peer_ip[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/classad/classadCache.cpp:158:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  FILE * fp = fopen ( szFile.c_str(), "a+" );
data/condor-8.6.8~dfsg.1/src/classad/classad_functional_tester.cpp:972:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                xml_file.open(filename.c_str());
data/condor-8.6.8~dfsg.1/src/classad/classad_functional_tester.cpp:1027:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            FILE *xml_file = fopen(file_name.c_str(), "r");
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:387:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buf[16];
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:390:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if( ( fd = open( logFileName.c_str( ), O_RDWR | O_CREAT, 0600 ) ) < 0 ) {
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:392:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:399:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", fd );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:401:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:429:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buf[16];
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:439:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    newLog_fd=open( tmpLogFileName.c_str(), O_RDWR | O_CREAT | O_TRUNC, 0600 );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:444:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:450:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", newLog_fd );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:452:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:471:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", GetLastError( ) );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:479:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:487:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if( ( log_fp = fopen( logFileName.c_str( ), "a+" ) ) == NULL ) {
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:489:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:92:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if( ( storagefd = open( storagefile.c_str( ), O_RDWR | O_CREAT, 0600 ) ) < 0 ) {	    
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:94:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[10];
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:95:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:187:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if( ( fd_check = open( CheckFileName.c_str(), O_RDWR | O_CREAT, 0600 ) ) < 0 ) {
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:195:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char  k[1];
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:219:32:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      LatestCheckpoint.tv_sec=atol(sec.c_str());
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:220:33:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      LatestCheckpoint.tv_usec=atol(usec.c_str());
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:253:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    long temp_sec=atol(sec.c_str());
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:254:21:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    long temp_usec=atol(usec.c_str());
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1783:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char arr[20];
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1784:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(arr,"%d.%d",(int)ctime.tv_sec,(int)ctime.tv_usec);
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1806:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if( ( fd_check = open( CheckFileName.c_str(), O_RDWR | O_CREAT, 0600 ) ) < 0 ) {
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1808:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		   char buf[10];
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1809:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		   sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1818:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[10];
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1819:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1836:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  OneCharactor[1];
data/condor-8.6.8~dfsg.1/src/classad/exprTree.cpp:66:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[24];
data/condor-8.6.8~dfsg.1/src/classad/exprTree.cpp:95:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buf[32];
data/condor-8.6.8~dfsg.1/src/classad/exprTree.cpp:96:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(buf, "%lld", intValue);
data/condor-8.6.8~dfsg.1/src/classad/exprTree.cpp:104:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char buf[24];
data/condor-8.6.8~dfsg.1/src/classad/exprTree.cpp:105:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(buf, "%g", doubleValue);
data/condor-8.6.8~dfsg.1/src/classad/extra_tests.cpp:240:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen("tmp.classads.tmp", "w");
data/condor-8.6.8~dfsg.1/src/classad/extra_tests.cpp:259:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen("tmp.classads.tmp", "r");
data/condor-8.6.8~dfsg.1/src/classad/extra_tests.cpp:281:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen("tmp.classads.tmp", "r");
data/condor-8.6.8~dfsg.1/src/classad/extra_tests.cpp:581:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[10240];
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:1246:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[64];
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:1296:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		if( sprintf( buffer, "%d %d %d", dd, mm, yy ) > 63 
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:2531:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char strval[25];
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:2533:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(strval,"%d+%02d:%02d:%02d", days, abs(hours), abs(min), abs(secs) );
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:2535:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(strval,"%d:%02d:%02d", hours, abs(min), abs(secs) );
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:2537:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(strval,"%d:%02d", min, abs(secs) );
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:2539:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(strval,"%d", secs );
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:2856:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char const *groups[MAX_REGEX_GROUPS];
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:3119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[1024]; // yech
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:56:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( ( new_filed = open(filename, O_RDWR | O_CREAT | O_APPEND, 0600 )) < 0 ) {
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  k[1];
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[10];
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:95:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  k[1];
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  k[1];
data/condor-8.6.8~dfsg.1/src/classad/jsonSink.cpp:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad/jsonSink.cpp:66:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( tempBuf, "%lld", i );
data/condor-8.6.8~dfsg.1/src/classad/jsonSink.cpp:79:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tempBuf, "%.1f", real);
data/condor-8.6.8~dfsg.1/src/classad/jsonSink.cpp:90:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tempBuf, "%.16G", real);
data/condor-8.6.8~dfsg.1/src/classad/jsonSink.cpp:94:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                    strcat(tempBuf, ".0");
data/condor-8.6.8~dfsg.1/src/classad/jsonSink.cpp:266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tempBuf[10];
data/condor-8.6.8~dfsg.1/src/classad/jsonSink.cpp:285:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf( tempBuf, "\\u00%02X", (int)*itr );
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:162:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	abstm.tm_year = atoi(timeStr.substr(i,4).c_str()) - 1900;
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:167:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		abstm.tm_mon = atoi(timeStr.substr(i,2).c_str()) - 1;
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:173:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		abstm.tm_mday = atoi(timeStr.substr(i,2).c_str());	
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:179:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		abstm.tm_hour += atoi(timeStr.substr(i,2).c_str()); 
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:185:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		abstm.tm_min += atoi(timeStr.substr(i,2).c_str());
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:191:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		abstm.tm_sec = atoi(timeStr.substr(i,2).c_str());	
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:397:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    number = atoi(numStr.c_str());
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:564:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            tzhr = atoi(offStr.substr(1,2).c_str());
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:565:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            tzmin = atoi(offStr.substr(3,2).c_str());
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:568:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            tzhr = -atoi(offStr.substr(1,2).c_str());
data/condor-8.6.8~dfsg.1/src/classad/literals.cpp:569:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            tzmin = -atoi(offStr.substr(3,2).c_str());
data/condor-8.6.8~dfsg.1/src/classad/man_cache_test.cpp:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   char a_cla[60];
data/condor-8.6.8~dfsg.1/src/classad/man_cache_test.cpp:92:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(a_cla, "[content=\"test\";key=%d]",count);
data/condor-8.6.8~dfsg.1/src/classad/man_cache_test.cpp:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   char ckey[10];
data/condor-8.6.8~dfsg.1/src/classad/man_cache_test.cpp:97:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(ckey,"%d",count);
data/condor-8.6.8~dfsg.1/src/classad/man_cache_test.cpp:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   char ckey[5];
data/condor-8.6.8~dfsg.1/src/classad/man_cache_test.cpp:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   char ckey[5];
data/condor-8.6.8~dfsg.1/src/classad/man_cache_test.cpp:134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   char ckey[5];
data/condor-8.6.8~dfsg.1/src/classad/optester.cpp:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buffer[1024];
data/condor-8.6.8~dfsg.1/src/classad/shared.cpp:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char      time_string[100];
data/condor-8.6.8~dfsg.1/src/classad/sink.cpp:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad/sink.cpp:147:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
								sprintf( tempBuf, "\\%03o", (unsigned char)*itr );
data/condor-8.6.8~dfsg.1/src/classad/sink.cpp:172:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( tempBuf, "%lld", i );
data/condor-8.6.8~dfsg.1/src/classad/sink.cpp:185:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tempBuf, "%.1f", real);
data/condor-8.6.8~dfsg.1/src/classad/sink.cpp:194:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tempBuf, "%.16G", real);
data/condor-8.6.8~dfsg.1/src/classad/sink.cpp:198:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                    strcat(tempBuf, ".0");
data/condor-8.6.8~dfsg.1/src/classad/sink.cpp:202:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tempBuf, "%1.15E", real);
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kvpbuf[longest_kvp];
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:83:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(kvpbuf, "\"<128.104.101.22:9618>#%lld#%4d#...\"", (long long)now-(60*60*48), urand()%10000);
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:86:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(kvpbuf, "ifThenElse(isUndefined(LastHeardFrom),CurrentTime,LastHeardFrom) - %lld < 3600", (long long)now-(60*60*48));
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:90:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(kvpbuf, "\"submit-1.chtc.wisc.edu#%u.%u#%lld\"", cluster, proc, (long long)now-(60*60*48));
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:94:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(kvpbuf, "\"%u.%u\"", cluster, proc);
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:97:35:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				{ int a = rand(), b = rand(); sprintf(kvpbuf, "\"%02X:%02X:%02X:%02X:%02X:%02X\"", a&0xFF, (a>>8)&0xFF, (a>>16)&0xFF, b&0xFF, (b>>8)&0xFF, (b>>16)&0xFF); }
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:101:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(kvpbuf, "\"INFO-MEM-B%03d-W.ad.wisc.edu\"", machine);
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:105:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(kvpbuf, "\"slot%d@INFO-MEM-B%03d-W.ad.wisc.edu\"", slots, machine);
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:110:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(kvpbuf, "\"<144.92.184.%03d:%d?CCBID=128.105.244.14:9620%%3fsock%%%x_%x#5702&PrivAddr=%%3c127.0.0.1:49226%%3e&PrivNet=INFO-MEM-B%03d-W.ad.wisc.edu>\"",
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:113:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(kvpbuf, "\"<144.92.%d.%d:9618?sock=%x_%x\"",
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:120:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(kvpbuf, "\"0x00000000000000000000000000000000\"");
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:137:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(kvpbuf, "%lld", val);
data/condor-8.6.8~dfsg.1/src/classad/test_classad_parse.cpp:144:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(kvpbuf, "%f", val);
data/condor-8.6.8~dfsg.1/src/classad/test_xml.cpp:89:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	temp_xml = fopen("temp_xml", "w");
data/condor-8.6.8~dfsg.1/src/classad/test_xml.cpp:93:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	temp_xml = fopen("temp_xml", "r");
data/condor-8.6.8~dfsg.1/src/classad/transaction.cpp:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char						tmp[16];
data/condor-8.6.8~dfsg.1/src/classad/transaction.cpp:197:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/transaction.cpp:209:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( tmp, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/transaction.cpp:226:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "%d", errno );
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:351:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      timebuf[32], sign;
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:365:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(timebuf, "%c%02d:%02d", sign, tzsecs / 3600, (tzsecs / 60) % 60);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:375:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    timebuf[128];
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:393:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(timebuf, "%d+%02d:%02d:%02d", days, hrs, mins, (int) secs);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:395:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(timebuf, "%d+%02d:%02d:%02g", days, hrs, mins, secs);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:400:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(timebuf, "%02d:%02d:%02d", hrs, mins, (int) secs);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:402:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(timebuf, "%02d:%02d:%02g", hrs, mins, secs);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:407:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(timebuf, "%02d:%02d", mins, (int) secs);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:409:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(timebuf, "%02d:%02g", mins, secs);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:415:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(timebuf, "%02d", (int) secs);
data/condor-8.6.8~dfsg.1/src/classad/util.cpp:417:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(timebuf, "%02g", secs);
data/condor-8.6.8~dfsg.1/src/classad/xmlSink.cpp:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad/xmlSink.cpp:174:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tempBuf, "%lld", i);
data/condor-8.6.8~dfsg.1/src/classad/xmlSink.cpp:196:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tempBuf, "%1.15E", real);
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char remote_user[128];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:435:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char formatted[2048];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cond[1024];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char suggest[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:439:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuff[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:450:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( tempBuff, "%i", p );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:454:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf( tempBuff, "%i", profile->explain.numberOfMatches );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:527:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( info, "%i", condition->explain.numberOfMatches );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:531:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf( suggest, "REMOVE" );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:581:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf( tempBuff, "%i", i+1 );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:609:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char formatted[2048];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:610:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char attr[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:611:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char suggest[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:727:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuff[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:728:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char formatted[2048];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:730:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cond[1024];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:732:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:802:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( tempBuff, "%i", p );
data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp:326:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp:337:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", frequency );
data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp:349:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( tempBuf, "%d", i );
data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp:796:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp:798:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", numCols );
data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp:803:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", numRows );
data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp:813:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tempBuf, "%d", rowTotalTrue[row] );
data/condor-8.6.8~dfsg.1/src/classad_analysis/boolValue.cpp:819:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tempBuf, "%d", colTotalTrue[col] );
data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.cpp:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuff[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.cpp:90:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuff, "%d", numberOfMatches );
data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.cpp:101:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuff, "%d", numberOfClassAds );
data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.cpp:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuff[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.cpp:166:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuff, "%d", numberOfMatches );
data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.cpp:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuff[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/explain.cpp:243:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuff, "%d", numberOfMatches );
data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.cpp:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[32];
data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.cpp:46:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buffer, "_ctx_%d", contextNum );
data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.cpp:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[32];
data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.cpp:57:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buffer, "_ctx_%d", contextNum );
data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.cpp:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[64];
data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.cpp:167:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buffer, "_ctx_%d._ad.ports[%d]", parentGangster->contextNum, 
data/condor-8.6.8~dfsg.1/src/classad_analysis/gangster.cpp:176:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buffer, "_ctx_%d._ad.ports[%d]", contextNum, dockNum );
data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp:754:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tempBuff[32];
data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp:765:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf( tempBuff, "%d", i );
data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp:2364:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp:2366:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", numCols );
data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp:2371:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", numRows );
data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp:2582:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp:2585:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", numCols );
data/condor-8.6.8~dfsg.1/src/classad_analysis/interval.cpp:2590:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", numRows );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:246:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", eNodeNum );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:502:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", adNum );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:505:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", portNum );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:624:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:626:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", edgeNum );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:633:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tempBuf, "%d", source->GetAdNum( ) );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:636:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tempBuf, "%d", source->GetPortNum( ) );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:645:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tempBuf, "%d", target->GetAdNum( ) );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:648:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tempBuf, "%d", target->GetPortNum( ) );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:743:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:750:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tempBuf, "%d", (*e)->GetEdgeNum( ) );
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:1199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempBuf[512];
data/condor-8.6.8~dfsg.1/src/classad_analysis/portGraph.cpp:1200:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( tempBuf, "%d", numPortNodes );
data/condor-8.6.8~dfsg.1/src/classad_analysis/start_analyzer.cpp:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char jobString[SIZE];
data/condor-8.6.8~dfsg.1/src/classad_analysis/start_analyzer.cpp:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machineString[SIZE];
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:61:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		numAttrs = atoi( argv[2] );
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:72:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		requestReqLen = atoi( argv[3] );
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:84:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		offerReqLen = atoi( argv[4] );
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:127:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			numOffers = atoi( argv[5] );
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:133:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			numUniqueOfferReqs = atoi( argv[6] );
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempAttr[32];
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:203:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tempAttr, "attr%i", i );
data/condor-8.6.8~dfsg.1/src/classad_analysis/testAnalysis.cpp:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempString[64];
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:271:75:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
InsertInLeftSecondary( Secondary *&list, const int &key, double val, bool open )
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:277:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	sec->open 	= open;
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:279:60:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( list==NULL || list->value>val || (list->value==val && open) ) {
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:287:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			tmp->next->open ) ) {
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:297:75:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
InsertInRightSecondary(Secondary *&list, const int &key, double val, bool open)
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:303:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	sec->open 	= open;
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:305:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( list==NULL || list->value<val || (list->value==val && !open) ) {
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:313:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			!tmp->next->open ) ) {
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:378:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			while(sec&&(sec->value>l || (sec->value==l && !sec->open && !o_l))){
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:386:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			while(sec&&(sec->value<r || (sec->value==r && !sec->open && !o_r))){
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:421:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			while(sec&&(sec->value>l || (sec->value==l && !sec->open && !o_l))){
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.cpp:444:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			while(sec&&(sec->value<r || (sec->value==r && !sec->open && !o_r))){
data/condor-8.6.8~dfsg.1/src/classad_support/intervalTree.h:44:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		bool		open;
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp:320:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        tmpBuf[16];
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp:363:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( tmpBuf, "{%d}#", expID++ );
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp:494:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
AddUpperBound( const string &attr, Value &val, bool open, bool constraint,
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp:539:59:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if( result.IsBooleanValue( b ) && b && !i.openUpper && open ) {
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp:547:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		i.openUpper = open;
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp:556:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
AddLowerBound( const string &attr, Value &val, bool open, bool constraint, 
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp:601:59:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if( result.IsBooleanValue( b ) && b && !i.openLower && open ) {
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.cpp:609:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		i.openLower = open;
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.h:61:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char   numOnBits[256];
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.h:98:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int AddUpperBound(const std::string&dim,Value& v,bool open,bool exp,int rkey=-1);
data/condor-8.6.8~dfsg.1/src/classad_support/rectangle.h:99:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int AddLowerBound(const std::string&dim,Value& v,bool open,bool exp,int rkey=-1);
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cmdString[32], buffer1[2048], buffer2[2048];
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	constraint[2048], rank[2048], partitionExprs[2048];
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char constraint[2048],rank[2048],partitionExprs[2048],rep[2048];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:69:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		TCHAR sz[256];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:276:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						TCHAR sz[256];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char psBuf[32];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:371:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		TCHAR szKey[50];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.h:48:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		TCHAR strTooltip[256];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/WindowsMessageReceiver.cpp:101:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		TCHAR sz[256];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdWatcherDlg.cpp:47:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			TCHAR sz[256];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdWatcherDlg.cpp:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char szBuf[bufSize+1];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdWatcherDlg.cpp:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char szBuf[bufSize+1];
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdwatcher.cpp:9:1:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
TCHAR szTitle[MAX_LOADSTRING];					// The title bar text
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/birdwatcher.cpp:10:1:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
TCHAR szWindowClass[MAX_LOADSTRING];			// the main window class name
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/PipeBuffer.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readahead_buffer[PIPE_BUFFER_READAHEAD_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/gahp.cpp:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[500];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/gahp.cpp:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff2[2];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/gahp.cpp:66:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (buff2, "%c", c);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[FORWARD_BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp:568:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			   (argc == (atoi (argv[3]) * 2 + 4)) &&
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:212:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char job_id_buff[30];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:213:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf (job_id_buff, "%d.%d",
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:274:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char job_id_buff[30];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:276:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf (job_id_buff, "job_%d_%d",
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:323:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char * result[2];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:334:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char * result[2];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1006:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char job_id_buff[30];
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1007:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (job_id_buff, "%d.%d", ClusterId, ProcId);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1201:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char *result[2] = { GAHP_RESULT_FAILURE, error_msg.c_str() };
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1208:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char *result[3] = { GAHP_RESULT_FAILURE, error_msg.c_str(), NULL };
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1215:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char *result[3] = { GAHP_RESULT_FAILURE, "-1.-1", error_msg.c_str() };
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1222:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char *result[3] = { GAHP_RESULT_FAILURE, error_msg.c_str(), "0" };
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1537:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*s = atoi(blah);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1543:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*s=(unsigned long)atol(blah);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1555:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*cluster_id=atoi(buff);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/schedd_client.cpp:1557:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*proc_id = atoi ((char*)(&buff[pdot-s+1]));
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char param[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char host[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cookie[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:247:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(default_filename,"r");
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:448:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:488:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:489:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(command, "write %d %d\n", fd, length);
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:578:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(command, "pwrite %d %d %d\n", fd, length, offset);
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:621:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:622:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(command, "swrite %d %d %d %d %d\n", fd, length, offset, 
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:653:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:672:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:846:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:866:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:886:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:998:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:1059:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&sa.storage, result->ai_addr, result->ai_addrlen );
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:1113:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(c,"%d",va_arg(args,int));
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:1152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    command[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_test.cpp:29:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buffer[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_test.cpp:30:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buffer2[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[CONDOR_HOSTNAME_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cookie[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8192];
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:809:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int length = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:920:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int uid = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:921:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int gid = atoi(argv[4]);
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:940:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int len = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:954:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int actime = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_chirp/condor_chirp.cpp:955:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int mtime = atoi(argv[4]);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:60:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(text,"Error: ");
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:72:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(text,"Error: ");
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:124:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(text,"Notice: ");
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:199:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:213:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file.h:65:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	virtual int open( const char *url, int flags, int mode )=0;
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buffer[TRANSFER_BLOCK_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:47:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int CondorFileAgent::open( const char *url_in, int flags, int mode )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char local_filename[L_tmpnam];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:96:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	result = original->open(sub_url,flags,mode);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:116:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	result = local_copy->open(local_url,local_flags,0700);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.h:43:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	virtual int open( const char *url, int flags, int mode );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.cpp:37:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int CondorFileAppend::open( const char *u, int flags, int mode )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.cpp:54:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int result = original->open(sub_url,flags|O_APPEND,mode);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.h:37:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	virtual int open( const char *url, int flags, int mode );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_basic.cpp:42:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int CondorFileBasic::open(const char *url_in, int flags, int mode)
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_basic.cpp:83:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = ::open(path,flags,mode);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_basic.h:38:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	virtual int open( const char *url, int flags, int mode );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:81:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &r->data[b->begin-begin], b->data, b->size );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:82:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &r->data[a->begin-begin], a->data, a->size );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:84:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &r->data[a->begin-begin], a->data, a->size );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &r->data[b->begin-begin], b->data, b->size );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:202:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int CondorFileBuffer::open( const char *url_in, int flags, int mode )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:259:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	result = original->open( sub_url, flags, mode );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:304:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(data,&c->data[offset-c->begin],piece);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->data,data,length);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.h:46:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	virtual int open(const char *url, int flags, int mode);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:47:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int CondorFileCompress::open( const char *url_in, int flags, int mode )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:64:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int result = original->open( sub_url, flags, mode );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char throwaway[THROWAWAY_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.h:45:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	virtual int open(const char *url, int flags, int mode);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[COMPRESS_BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_fd.cpp:31:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int CondorFileFD::open(const char *url_in, int flags, int /* mode */)
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_fd.h:36:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	virtual int open( const char *url, int flags, int mode );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:522:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if( f->open(url,flags,mode)>=0 ) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:668:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int CondorFileTable::open( const char *logical_name, int flags, int mode )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.h:153:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int	open( const char *path, int flags, int mode );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/fix_gnu_fcntl.h:31:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open  __hide_open
data/condor-8.6.8~dfsg.1/src/condor_ckpt/fix_gnu_fcntl.h:39:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#undef open
data/condor-8.6.8~dfsg.1/src/condor_ckpt/fix_gnu_fcntl.h:47:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int       open (const char*, int, ...);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:891:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    wd[_POSIX_PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:980:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void *memcpy(void *s1, const void *s2, size_t n)
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:997:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(s1, s2, n);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:1157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp_name[ PATH_MAX ];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:1602:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(saved_zbuf, saved_zstr->next_in,
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pad[ 1024 - 2 * sizeof(int) - NAME_LEN - sizeof(RAW_ADDR)];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[14];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_iwd[_POSIX_PATH_MAX]; // the initial working directory of the program
data/condor-8.6.8~dfsg.1/src/condor_ckpt/machdep.LINUX.cpp:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	proc[128];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/machdep.LINUX.cpp:223:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(proc, "/proc/%d/maps", syscall(SYS_getpid));
data/condor-8.6.8~dfsg.1/src/condor_ckpt/malloc.c:596:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void* memcpy(void*, const void*, size_t);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/malloc.c:599:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
Void_t* memcpy();
data/condor-8.6.8~dfsg.1/src/condor_ckpt/malloc.c:1743:41:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MALLOC_COPY(dest, src, nbytes)  memcpy(dest, src, nbytes)
data/condor-8.6.8~dfsg.1/src/condor_ckpt/malloc.c:1814:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 (dev_zero_fd = open("/dev/zero", O_RDWR), \
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[8192];	/* this number is hardcoded due to the sscanf fmt string */
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char table[MAX_TAB_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:90:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "/proc/%u/maps", pid);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			path[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/shared_utils.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out[VFPRINTF_LEN + 1];	/* the output buffer passed to SYS_write */
data/condor-8.6.8~dfsg.1/src/condor_ckpt/shared_utils.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char d64[ASCII64DECIMAL];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/shared_utils.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char x64[ASCII64HEXADECIMAL];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/shared_utils.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char o64[ASCII64OCTAL];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/shared_utils.c:264:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char basemap[16];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/signals_support.c:198:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( (char *) &nvec,(char *) vec, sizeof nvec );
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          machine_name[MAX_MACHINE_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.h:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            file_name[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.h:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char        owner_name[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           temp_name[INET6_ADDRSTRLEN];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:251:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            pathname1[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            pathname2[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:300:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           owner_name[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:301:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           file_name[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.cpp:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char            pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.cpp:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            new_pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.cpp:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            old_pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netpkt[SREQ_PKTSIZE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netpkt[SREP_PKTSIZE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:380:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				capacity_free_ACD[MAX_ASCII_CODED_DECIMAL_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:473:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netpkt[STREQ_PKTSIZE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:707:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netpkt[STREP_PKTSIZE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:774:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netpkt[RSTREQ_PKTSIZE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:1033:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netpkt[RSTREP_PKTSIZE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:1152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char bytes[sizeof(uint64_t)];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:1205:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char bytes[sizeof(uint64_t)];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:1301:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *lookup[16] = 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        hostname[100];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:384:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( (char*) &server_addr, (char*) &tmp->sin_addr.s_addr, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:587:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:730:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:734:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:763:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Invalid authentication ticket [%lu] used", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:773:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(log_msg, "Service: CKPT_SERVER_SERVICE_STATUS");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:776:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(log_msg, "Service: SERVICE_RENAME");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:779:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(log_msg, "Service: SERVICE_DELETE");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:782:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(log_msg, "Service: SERVICE_EXIST");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:809:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Owner field contans illegal path components!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:811:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Service request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:825:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Filename field contans illegal path components");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:827:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Service request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:841:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "ShadowIpAddr field contans illegal path components");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:843:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Service request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1102:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(log_msg, "Attempt returns error #%d", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        		log_msg[256], buf[10240];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1385:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1427:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(log_msg, "File size: %lu", (unsigned long int)store_req.file_size);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1441:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Owner field contans illegal path components!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1443:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "STORE request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1457:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Filename field contans illegal path components!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1459:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "STORE request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1473:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "ShadowIpAddr field contans illegal path components!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1475:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "STORE request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1521:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "ERROR: I_bind() returns an error (#%d)", 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1528:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "ERROR: I_listen() fails to listen");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1594:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char size[40];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1595:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(size, "%d", (int) store_req.file_size);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1623:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			   peer_info_filename[100];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1675:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(peer_info_filename, "/tmp/condor_ckpt_server.%d", getpid());
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1701:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1703:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1760:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Owner field contans illegal path components!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1762:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "RESTORE request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1776:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "Filename field contans illegal path components!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1778:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "RESTORE request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1792:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "ShadowIpAddr field contans illegal path components!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1794:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(log_msg, "RESTORE request DENIED!");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1862:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		  sprintf(log_msg, "ERROR: I_bind() returns an error (#%d)", err_code);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1867:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		  sprintf(log_msg, "ERROR: I_listen() fails to listen");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1929:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			   peer_info_filename[100];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1930:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char               log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1971:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(peer_info_filename, "/tmp/condor_ckpt_server.%d", getpid());
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1992:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		  peer_info_filename[100];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1998:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          pathname[MAX_PATHNAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1999:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          log_msg[256];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2045:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(log_msg, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2056:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(log_msg, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2073:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(log_msg,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2093:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(log_msg, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2108:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(log_msg, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2122:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(log_msg, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2131:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(log_msg, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2148:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(log_msg, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2161:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(log_msg, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2173:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(peer_info_filename, "/tmp/condor_ckpt_server.%d", child_pid);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char real_path[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char real_ckpt_server_dir[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:54:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				 char        filename[MAX_CONDOR_FILENAME_LENGTH])
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ckpt_server_config[30], *tmp;
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:647:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(ckpt_server_config, "CKPT_SERVER_HOST_%d", i);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.h:38:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		 char        filename[MAX_CONDOR_FILENAME_LENGTH]);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_typedefs.h:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    filename[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_typedefs.h:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    owner[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_typedefs.h:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   filename[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_typedefs.h:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   owner[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       file_name[STATUS_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       machine_IP_name[STATUS_MACHINE_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char       owner_name[STATUS_OWNER_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           machine_IP_name[MAX_MACHINE_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           owner_name[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           file_name[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:111:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   filename[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   owner[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   filename[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   owner[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:160:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    owner_name[MAX_NAME_LENGTH]; 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    file_name[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    new_file_name[MAX_CONDOR_FILENAME_LENGTH-4]; /* -4 to fit shadowIP */
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           capacity_free_ACD[MAX_ASCII_CODED_DECIMAL_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   filename[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/typedefs2.h:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   owner[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[128], *tmp;
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:148:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(line, "NumSends = %d", num_sends);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:150:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(line, "BytesSent = %d", (int) bytes_sent);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:152:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(line, "TimeSending = %d", time_sending);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:154:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(line, "AvgSendBandwidth = %f", num_sends ?
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:157:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(line, "NumRecvs = %d", num_recvs);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:159:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(line, "BytesReceived = %d", (int) bytes_recv);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:161:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(line, "TimeReceiving = %d", time_recving);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:163:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(line, "AvgReceiveBandwidth = %f", num_recvs ?
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xfer_summary.cpp:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peer_IP[20];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xferstat2.cpp:282:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char*) &t->shadow_addr, (char*) &shadow_addr, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xferstat2.h:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char           filename[MAX_CONDOR_FILENAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xferstat2.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char           owner[MAX_NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector.cpp:1208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector.cpp:1243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[128];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector.cpp:1939:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[100];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector_engine.cpp:594:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char newname[150],oldname[130];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector_stats.cpp:148:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( newbuf, historyBuffer, historyWords );
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/collector_stats.cpp:643:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[256]   = "";
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char InpLine[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char OutLine[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char InpLine[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char OutLine[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:633:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Line[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:667:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[100];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:680:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[100];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:700:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char OutLine[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Machine[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:821:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:891:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[200] = "";
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:892:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char StateDesc[50];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:944:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[200];
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:945:54:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	if (cad->LookupString(ATTR_ARCH,tmp,sizeof(tmp))<0) strcpy(tmp,"Unknown");
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:947:55:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	if (cad->LookupString(ATTR_OPSYS,tmp,sizeof(tmp))<0) strcpy(tmp,"Unknown");
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:1019:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[200];
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterID.cpp:202:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setSize(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetMasterIDResponse.cpp:314:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRemaining(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotID.cpp:202:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setSize(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/collector/src/AviaryCollector_GetSlotIDResponse.cpp:314:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRemaining(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:177:70:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRunning_jobs(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:260:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setIdle_jobs(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:343:69:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setTotal_hosts(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:426:71:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setClaimed_hosts(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:509:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setUnclaimed_hosts(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_CollectorSummary.cpp:592:69:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setOwner_hosts(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_MasterSummary.cpp:333:66:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setReal_uid(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:398:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setMatches(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:481:66:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setDuration(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:564:68:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setSchedulers(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:647:75:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setActive_submitters(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:730:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setIdle_jobs(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:813:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setJobs_considered(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:896:68:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRejections(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:979:69:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setTotal_slots(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1062:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setCandidate_slots(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1145:71:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setTrimmed_slots(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_NegotiatorSummary.cpp:1381:32:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                               sprintf (text_value_2, "%f", (double)property_Match_rate);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_ResourceID.cpp:776:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setBirthdate(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:291:74:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setMax_jobs_running(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:374:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setUsers(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:457:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setAds(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:540:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRunning(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:623:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setHeld(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:706:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setIdle(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SchedulerSummary.cpp:789:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRemoved(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:673:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setCpus(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:756:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setDisk(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:839:64:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setMemory(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:922:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setSwap(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:1005:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setMips(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SlotSummary.cpp:2081:32:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                               sprintf (text_value_10, "%f", (double)property_Load_avg);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionID.cpp:445:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setQdate(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:385:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setCompleted(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:468:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setHeld(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:551:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setIdle(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:634:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRemoved(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:717:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRunning(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:800:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setSuspended(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmissionSummary.cpp:883:77:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setTransferring_output(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:180:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRunning(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:263:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setHeld(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/common/src/AviaryCommon_SubmitterSummary.cpp:346:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setIdle(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetDataNode.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetDataNodeResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetJobTracker.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetJobTrackerResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetNameNode.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetNameNodeResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetTaskTracker.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_GetTaskTrackerResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:661:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setSubmitted(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopQueryResult.cpp:744:64:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setUptime(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_HadoopStart.cpp:642:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setCount(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartDataNode.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartDataNodeResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartJobTracker.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartJobTrackerResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartNameNode.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartNameNodeResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartTaskTracker.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StartTaskTrackerResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopDataNode.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopDataNodeResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopJobTracker.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopJobTrackerResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopNameNode.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopNameNodeResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopTaskTracker.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/hadoop/src/AviaryHadoop_StopTaskTrackerResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ContinueJob.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ContinueJobResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_HoldJob.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_HoldJobResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ReleaseJob.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_ReleaseJobResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_RemoveJob.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_RemoveJobResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SetJobAttributeResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SuspendJob.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/job/src/AviaryJob_SuspendJobResponse.cpp:302:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(p_prefix, "n%d", (*next_ns_index)++);
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobData.cpp:279:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setMax_bytes(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetJobDataResponse.cpp:510:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setFile_size(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionID.cpp:202:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setSize(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/codegen/query/src/AviaryQuery_GetSubmissionIDResponse.cpp:314:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                            status = setRemaining(atoi(text_value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/AviaryCollectorServiceSkeleton.cpp:402:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            copy_res_id->setBirthdate(atoi(resource_attr_map[ATTR_DAEMON_START_TIME]->getValue()));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/Collectables.cpp:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char arch[12];
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/collector/Collectables.cpp:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char opsys[12];
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/AviaryUtils.cpp:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fixbuf[AVIARY_UTILS_FIXBUF];
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/ClassadCodec.cpp:142:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                ad.Assign(name, atoi(value->getValue()));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_utils.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[256];
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopPlugin.cpp:304:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    DirtyJobStatus status(name, atoi(value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/AviaryHadoopPlugin.cpp:306:66:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    dirtyJobs->push_back(DirtyJobEntry(key, DirtyJobStatus(name, atoi(value))));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/hadoop/HadoopObject.cpp:417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[22]; // 22 is max size for an id, 2^32 + . + 2^32 + \0
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryScheddPlugin.cpp:347:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	DirtyJobStatus status(name, atoi(value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/AviaryScheddPlugin.cpp:349:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	dirtyJobs->push_back(DirtyJobEntry(key, DirtyJobStatus(name, atoi(value))));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/job/SchedulerObject.cpp:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[22]; // 22 is max size for an id, 2^32 + . + 2^32 + \0
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/HistoryFile.cpp:104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(m_stat, stat_wrapper.GetBuf(), sizeof(StatStructType));
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/Job.cpp:308:38:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						m_summary_ad->Assign(ATTRS[i], atol(attr->getValue()));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_dbmsd/ManagedDatabase.cpp:180:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dbsize = atoi(DBObj->getValue(0, 0));		
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_dbmsd/ManagedDatabase.cpp:197:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char msg_body[4000];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:632:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[ STDOUT_READBUF_SIZE ];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:734:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[STDOUT_READBUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:764:68:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                    m_hdfsAd.Assign(adKey.Value(), atoi(adValue.Value()));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:777:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[STDOUT_READBUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/declare_queues.cpp:37:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int port =  argc>2 ? atoi(argv[2]) : atoi(sPort.c_str()); //argc>2 ? atoi(argv[2]) : 5672;
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/declare_queues.cpp:37:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int port =  argc>2 ? atoi(argv[2]) : atoi(sPort.c_str()); //argc>2 ? atoi(argv[2]) : 5672;
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/declare_queues.cpp:42:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    connection.open(host, port);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/getPort.cpp:44:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(path, "/tmp/qpidPort");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon.cpp:239:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[STDOUT_READBUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon.cpp:269:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          m_qpidAd.Assign(adKey.Value(), atoi(adValue.Value()));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon.cpp:281:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[STDOUT_READBUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:107:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pRFile.open(persistFile, ios::in); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:123:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      seek_pos = atoi(temp);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:125:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      fileVersion = atoi((char*)(seekStr.substr(seekStr.length()-2,1)).c_str());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:126:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      is_rotated = atoi((char*)(seekStr.substr(seekStr.length()-1,1)).c_str());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:181:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pWFile.open(tempPersistFile, ios::out); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:215:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  dbWFile.open(oFile); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:219:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dbWFile.open(oFile,ios::out); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:265:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      dbWFile.open(oFile); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:268:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        dbWFile.open(oFile,ios::out); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:296:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      dbWFile.open(oFile,ios::trunc); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:299:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        dbWFile.open(oFile,ios::out); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:556:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  eFile.open(errorFile, ios::app); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:587:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tbuf[128];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener.cpp:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[256];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener.cpp:44:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			return atoi(buffer);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener.cpp:118:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        connection.open(host, port);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[256];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:54:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			return atoi(buffer);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[20];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostProx[20];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:185:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    connection.open(host, port);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[256];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:65:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			return atoi(buffer);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:142:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  prevStateFile.open(prevStateFileName,ios::out);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:350:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int msgId =atoi(idValStr.c_str());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:370:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int msgId =atoi(idValStr.c_str());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:442:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    connection.open(host, port);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:455:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   	ifile.open(loadFile, ios::in|ios::out);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:501:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    connection.open(host, port);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:621:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  eFile.open(errorFile, ios::app); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:656:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tbuf[128] ;//="";
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:730:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  	erotate = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:733:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  	excludeOn = atoi(argv[4]);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:747:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  persistFile.open("LRM.dat", ios::app);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:529:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					clock = atoi(value.Value());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:599:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					clock = atoi(value.Value());					
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:104:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *data_arr[3];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:588:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cid[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:589:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pid[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:668:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:869:9:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	iCid = atol(cid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:870:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(cid,"%ld", iCid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:876:6:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (atol(pid) == -1) {// Cluster ID
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:897:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  cid[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:898:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  pid[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:900:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *data_arr[4];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:961:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cid[100];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pid[100];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:964:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *data_arr[4];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1025:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cid[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1026:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pid[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1031:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *data_arr1[6];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1034:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *data_arr2[6];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1051:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				clock = atoi(value);				
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1098:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				clock = atoi(value);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cid[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pid[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1314:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	mtime = atoi(DBObj->getValue(0, 0)); // last_file_mtime
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1315:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	size =  atoi(DBObj->getValue(0, 1)); // last_file_size
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1321:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	lcmd->next_offset = atoi(DBObj->getValue(0,2)); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1322:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	lcmd->offset = atoi(DBObj->getValue(0,3)); // last_cmd_offset
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1323:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	lcmd->op_type = atoi(DBObj->getValue(0,4)); // last_cmd_type
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1361:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(dest, ", ");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1363:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(dest, " = '");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:260:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char *data_arr[3];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expr[1000];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:353:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expr[1000];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char optype[8], eventtype[CONDOR_TT_EVENTTYPEMAXLEN];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:702:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:752:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    xmlLogList[CONDOR_TT_MAXLOGNUM][CONDOR_TT_MAXLOGPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:753:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    xmlLogCopyList[CONDOR_TT_MAXLOGNUM][CONDOR_TT_MAXLOGPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:870:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *data_arr[7];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:893:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				prevLHFInAd = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:938:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1012:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1093:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		prevLHFInDB = atoi(DBObj->getValue(0, 0));		
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1351:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				prevLHFInAd = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1386:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1464:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		prevLHFInDB = atoi(DBObj->getValue(0, 0));	   
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1618:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *data_arr[7];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1638:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				prevLHFInAd = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1674:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1755:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		prevLHFInDB = atoi(DBObj->getValue(0, 0));		
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1929:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				prevLHFInAd = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1965:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2043:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		prevLHFInDB = atoi(DBObj->getValue(0, 0));		
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2222:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2337:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2422:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2450:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				eventtype = atoi(newvalue.Value());
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char f_name[_POSIX_PATH_MAX] = "", f_host[50] = "", 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2488:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pathname[_POSIX_PATH_MAX] = "";
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2489:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hexSum[MAC_SIZE*2+1] = "", sum[MAC_SIZE+1] = "";	
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2521:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				f_size = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2530:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	old_ts = atoi(f_ts);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2555:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  			sprintf(&hexSum[2*i], "%2x", sum[i]);		
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2587:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char f_name[_POSIX_PATH_MAX] = "", f_host[50] = "", f_path[_POSIX_PATH_MAX] = "", f_ts[30] = "", globaljobid[100] = "", type[20] = "";
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2619:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				f_size = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2630:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	clock = atoi(f_ts);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2671:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char globaljobid[100];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2672:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char src_name[_POSIX_PATH_MAX] = "", src_host[50] = "",
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2674:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dst_name[_POSIX_PATH_MAX] = "", dst_host[50] = "",
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2676:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[_POSIX_PATH_MAX] = "", name[_POSIX_PATH_MAX] = "";
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2677:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathname[2*_POSIX_PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2678:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dst_daemon[15];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2679:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char f_ts[30];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2682:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char is_encrypted[6] = "";
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2689:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hexSum[MAC_SIZE*2+1] = "", sum[MAC_SIZE+1] = "";
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2714:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      src_port = atoi(attVal); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2722:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      dst_port = atoi(attVal); 
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2730:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      transfer_size = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2732:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      elapsed = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2734:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      transfer_time = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2738:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      delegation_method_id = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2746:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  old_ts = atoi(f_ts);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2793:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&hexSum[2*i], "%2x", sum[i]);		
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2846:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2912:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					clock = atoi(attVal);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2972:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2050];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3097:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[4097];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3119:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sum, checksum, MAC_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[4097];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    sqlLogList[CONDOR_TT_MAXLOGNUM][CONDOR_TT_MAXLOGPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.h:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    sqlLogCopyList[CONDOR_TT_MAXLOGNUM+1][CONDOR_TT_MAXLOGPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/HistoryFile.cpp:105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(m_stat, stat_wrapper.GetBuf(), sizeof(StatStructType));
data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/Job.cpp:340:38:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						m_summary_ad->Assign(ATTRS[i], atol(attr->GetValue()));
data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtScheddPlugin.cpp:496:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	DirtyJobStatus status(name, atoi(value));
data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/MgmtScheddPlugin.cpp:498:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	dirtyJobs->push_back(DirtyJobEntry(key, DirtyJobStatus(name, atoi(value))));
data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SchedulerObject.cpp:412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[22]; // 22 is max size for an id, 2^32 + . + 2^32 + \0
data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/plugins/SubmitterUtils.cpp:56:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *invalid_chars[invalid_char_len] =
data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSHistoryFile.cpp:131:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(m_stat, stat_wrapper.GetBuf(), sizeof(StatStructType));
data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/TriggerConsole.cpp:113:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      qpidConnection.open();
data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/TriggerConsole.cpp:126:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         qmf2Session.open();
data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/test_triggers.cpp:255:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   int port = argc>2 ? atoi(argv[2]) : 5672;
data/condor-8.6.8~dfsg.1/src/condor_contrib/utils/broker_utils.cpp:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char password[MAX_PASSWORD_LENGTH + 1];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.cpp:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[200];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.cpp:1683:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ver[128];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.cpp:1746:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100], *tmp, *my_name;
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager_lease.cpp:212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	m_lease_id[256];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager_lease.cpp:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	m_lease_ad[2048];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager_lease.cpp:220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	m_static[4096];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1332:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[512];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1543:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, "job_%d_%d = %d", job_id.cluster, job_id.proc,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char attr_name[64];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1615:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( attr_name, "result_total_%d", AR_ERROR );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1618:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( attr_name, "result_total_%d", AR_SUCCESS );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1621:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( attr_name, "result_total_%d", AR_NOT_FOUND );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1624:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( attr_name, "result_total_%d", AR_BAD_STATUS );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1627:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( attr_name, "result_total_%d", AR_ALREADY_DONE );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1630:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( attr_name, "result_total_%d", AR_PERMISSION_DENIED );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1658:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "result_total_%d = %d", AR_ERROR, ar_error );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1661:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "result_total_%d = %d", AR_SUCCESS,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1665:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "result_total_%d = %d", AR_NOT_FOUND,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1669:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "result_total_%d = %d", AR_BAD_STATUS,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1673:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "result_total_%d = %d", AR_ALREADY_DONE,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1677:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "result_total_%d = %d", AR_PERMISSION_DENIED,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1688:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1694:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "job_%d_%d", job_id.cluster, job_id.proc );
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1705:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1736:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, "No result found for job %d.%d", job_id.cluster,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1741:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, "Job %d.%d not found", job_id.cluster,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1760:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d not held to be released", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1763:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d not in `X' state to be forcibly removed", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1766:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d not running to be vacated", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1769:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d not running to be fast-vacated", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1772:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d not running to be suspended", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1775:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d not running to be continued", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1779:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Invalid result for job %d.%d", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1786:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d already held", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1789:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d already marked for removal",
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1792:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d already suspended",
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1795:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d already running",
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1801:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Job %d.%d already marked for forced removal",
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1806:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "Invalid result for job %d.%d", 
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_startd.cpp:608:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024]; 
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock_file.cpp:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	hostname[128];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_lock_file.cpp:137:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( hostname, "unknown-%d", rand( ) );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_softkill.WINDOWS.cpp:69:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t szName[MAX_PATH] = {0};
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/condor_softkill.WINDOWS.cpp:209:15:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	target_pid = _wtoi(__wargv[1]);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.cpp:512:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpbuf[6];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.cpp:586:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	int tmp_req; memcpy(static_cast<void*>(&tmp_req), tmpbuf+1, sizeof(int));
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.cpp:590:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmpbuf2[8+5]; memset(tmpbuf2, 0, sizeof(tmpbuf2));
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.cpp:595:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(static_cast<void*>(&tmp_req), tmpbuf3, sizeof(int));
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.cpp:928:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						unsigned char  rbuf[24];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.cpp:930:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy (rbuf, rkey, 24);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_command.cpp:1552:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int durint = atoi(dur) + slop;
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char max_fds_name[50];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:3255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ipstr[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:3256:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(ipstr, "(unknown)");
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:3348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char asyncpipe_buf[10];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:3355:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:3669:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[16];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:4354:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char callback_desc[50];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:5109:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char check_name[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:5944:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char child_stack[stack_size];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:6178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char envid[PIDENVID_ENVID_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:7370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char systemshell[MAX_PATH+1];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:8011:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char script_buf[buflen + 1]; script_buf[buflen] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:8015:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
						((script_fd = open(executable_fullpath, O_RDONLY)) >= 0) &&
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:8669:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ppid = atoi(ptmp);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:8783:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ppid = atoi(ptmp);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:9758:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char exception_string[80];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:9770:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(exception_string,"signal %d",sig);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:10882:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy (_cookie_data, data, len);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:10899:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (data, _cookie_data, _cookie_len);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:11026:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char    localAd_path[100];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:11243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[DC_PIPE_BUF_SIZE + 1];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:176:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char randomjunk[256];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char symbols[16] = { '0', '1', '2', '3', '4', '5', '6', '7',
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:394:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	addr_file[100];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:582:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:684:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:1059:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat (pname, "_LOG");
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:2077:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					command_port = atoi( *ptr );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:2096:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				runfor = atoi( *ptr );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:61:13:  [2] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
            _tcscpy( pszDot, _T("RPT") );   // "RPT" -> "Report"    
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:140:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR szFaultingModule[MAX_PATH];    
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:210:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static TCHAR szBuffer[512] = { 0 };
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:268:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szModule[MAX_PATH] = _T("");        
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:399:13:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            TCHAR szModule[MAX_PATH] = _T("");
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:414:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR szBuff[1024];    
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.h:55:14:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static TCHAR m_szLogFileName[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/mimetypes.cpp:85:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char gperf_downcase[256] =
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.cpp:375:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf, m_async_io_buf + bytes, m_async_io_size);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.cpp:458:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(m_async_io_buf, buffer, m_async_io_size);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.cpp:504:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buf, m_async_io_buf + bytes, m_async_io_size);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.cpp:553:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf, m_async_io_buf + bytes, m_async_io_size);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp:418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char subject[1024];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp:504:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ext[FILEEXT_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp:523:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bbb[4096];
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp:524:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_dagman_metrics_reporter.cpp:194:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				duration = std::atoi( argv[ii] );
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_dagman_metrics_reporter.cpp:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char error_buffer[CURL_ERROR_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:1048:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				shallowOpts.iDebugLevel = atoi(argv[++iArg]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:1124:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				deepOpts.autoRescue = (atoi(argv[++iArg]) != 0);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:1132:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				deepOpts.doRescueFrom = atoi(argv[++iArg]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:1205:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				shallowOpts.priority = atoi(argv[++iArg]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:1263:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		shallowOpts.iMaxIdle = atoi(argv[++argNum]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:1272:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		shallowOpts.iMaxJobs = atoi(argv[++argNum]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:1281:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		shallowOpts.iMaxPre = atoi(argv[++argNum]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:1290:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		shallowOpts.iMaxPost = atoi(argv[++argNum]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/dag.cpp:3337:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[100];
data/condor-8.6.8~dfsg.1/src/condor_dagman/dag.cpp:3712:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char nodeName[1024] = "";
data/condor-8.6.8~dfsg.1/src/condor_dagman/dag.cpp:3759:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char nodeName[1024] = "";
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:691:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            debug_level = (debug_level_t) atoi (argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:715:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            dagman.maxIdle = atoi( argv[i] );
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:723:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            dagman.maxJobs = atoi( argv[i] );
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:735:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            dagman.maxPreScripts = atoi( argv[i] );
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:743:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            dagman.maxPostScripts = atoi( argv[i] );
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:785:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            dagman.autoRescue = (atoi( argv[i] ) != 0);
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:793:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            dagman.doRescueFrom = atoi (argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_main.cpp:857:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			dagman._priority = atoi(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_submit.cpp:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[UTIL_MAX_LINE_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:228:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fPrio = fopen(fileNamePrio,"wt");
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_ARGV_LEN+40];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:566:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE* fElig = fopen(fileNameElig,"wt");
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:581:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer1[bufSize];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:582:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer2[bufSize];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:583:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer3[bufSize];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fileNameDagmanPri[1000];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:591:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		streamOUT = fopen( fileNameDagmanPri, "wt" );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:636:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		streamOUT = fopen( fileNameDagmanPri, "a+t" );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:646:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char old[1000];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:663:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buffer[bufSize];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char fileNameSdfNew[1000];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:691:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				sdfNEW = fopen( fileNameSdfNew, "wt");
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:742:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat( buffer, ".OLD" );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:763:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat( buffer, ".OLD" );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:788:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat( buffer, ".NEW" );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/DagmanDag.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tab[TAB_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Graph.cpp:638:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	stream = fopen(fileName,"wt");
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Graph.cpp:668:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	stream = fopen(fileName,"wt");
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp:45:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	stream = fopen(fileName,"rt");
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tab[10];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizerWithCont.cpp:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tab[500];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizerWithCont.cpp:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tab[50];
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/Superdag.cpp:901:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	stream = fopen(fileName,"wt");
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/curl_plugin.c:52:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			file = fopen(argv[2], "w");
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/curl_plugin.c:97:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			file = fopen(argv[1], "r");
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/data_plugin.c:13:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[4] = { 0, 0, 0, 0};
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/data_plugin.c:76:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char out[4];
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/data_plugin.c:98:34:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if(data && lastslash && (file = fopen(dest, "w"))) {
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs_plugin.cpp:152:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                HDFS = hdfsConnect(host, atoi(port));
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/PipeBuffer.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readahead_buffer[PIPE_BUFFER_READAHEAD_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[FORWARD_BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:398:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					const char * res[2] = {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:435:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					const char * res[1] = {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:471:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					const char * res[1] = {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:829:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash_buf[MD5_DIGEST_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c_hex_md5[MD5_DIGEST_LENGTH*2+1];
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:834:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(&(c_hex_md5[i*2]), "%02x", hash_buf[i]);
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:1037:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char * res[2] = {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:1051:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char * res[2] = {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:1076:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char * res[1] = {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:1088:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char * res[1] = {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:1113:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char * res[1] = {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:1125:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char * res[1] = {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/basejob.cpp:1030:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[128];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/basejob.cpp:1068:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char removeReason[256];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/basejob.cpp:1420:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/baseresource.cpp:119:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			jobLimit = atoi( limits.next() );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/baseresource.cpp:122:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					jobLimit = atoi( tmp2 );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boincjob.cpp:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[4096];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boincjob.cpp:736:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[4096];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:1139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:1327:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		attrs_to_copy = new char *[sl.number() + 1];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamjob.cpp:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[4096];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamjob.cpp:1254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamresource.cpp:143:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( delegationServiceUri, "https://" );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamresource.cpp:154:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( serviceUri, "https://" );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:94:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:102:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:106:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:147:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:151:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:201:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:248:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:287:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:295:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:299:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:352:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:358:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:405:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:411:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:453:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int return_code = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:513:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int return_code = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:571:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int result_code = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:659:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:665:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:670:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:714:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:767:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:922:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:930:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:934:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:974:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:982:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:986:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:1027:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2-gahp-client.cpp:1031:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:1429:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:2083:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_str[40];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:2087:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_str[37];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2resource.cpp:214:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    gs.NumRequests = atoi( statistics.next() );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2resource.cpp:215:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    gs.NumDistinctRequests = atoi( statistics.next() );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2resource.cpp:216:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    gs.NumRequestsExceedingLimit = atoi( statistics.next() );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2resource.cpp:217:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    gs.NumExpiredSignatures = atoi( statistics.next() );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:338:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[20];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:479:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)buf)[0] = ((char *)m_buffer)[m_buffer_pos];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:479:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	((char *)buf)[0] = ((char *)m_buffer)[m_buffer_pos];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:1474:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char auth[80] = "";
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:1718:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[5001];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:1942:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[200];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:1947:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(buf,"Unknown error");
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2010:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2087:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2146:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2202:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2203:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*failure_code = atoi(result->argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2205:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*job_status = atoi(result->argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2275:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2276:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*failure_code = atoi(result->argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2278:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*job_status = atoi(result->argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2342:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2343:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*failure_code = atoi(result->argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2345:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*job_status = atoi(result->argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2400:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2454:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2507:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2763:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num_results = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2801:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			result_reqid = atoi(result->argv[0]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2814:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
								atoi(result->argv[2]), atoi(result->argv[3]) );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2814:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
								atoi(result->argv[2]), atoi(result->argv[3]) );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2934:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[150];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:2976:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int ec = result.argc >= 2 ? atoi(result.argv[1]) : GAHPCLIENT_COMMAND_NOT_SUPPORTED;
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:3206:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*num_ads = atoi(result->argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:3868:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:3929:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:3944:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			(*status_ad)->Assign( ATTR_JOB_STATUS, atoi( result->argv[3] ) );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:3998:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4060:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi( result->argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4331:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4398:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4472:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4538:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4610:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4682:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4762:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4828:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4829:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ( atoi( result->argv[2] ) ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4834:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		exit_code = atoi( result->argv[3] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4895:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4958:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int rc = atoi(result->argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:5284:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[150];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:5854:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if( result->argc != 3 + atoi(result->argv[2]) * 4){
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:5872:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*exit_code = atoi(result->argv[5]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:5936:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			num_results = atoi(result->argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:5959:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				status.exit_code = atoi(result->argv[offset + 2]);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:6164:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				lease_expiry = atoi( result->argv[2] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:6439:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			int cnt = atoi( result->argv[2] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:6581:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				j_cnt = atoi( result->argv[i] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:6679:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			exit_status = atoi( result->argv[2] );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.h:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_gahp_version[150];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp:858:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp:1001:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_str[40];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp:1007:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uuid_str[37];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:182:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buff[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:1512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char size_str[128];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:1523:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf( size_str, "%d %d", output_size, error_size );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:2257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusresource.cpp:866:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusresource.cpp:867:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char contact[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusresource.cpp:968:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.cpp:580:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expr_buf[12000];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gridmanager.cpp:948:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:975:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char target[LINK_BUFSIZE];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:1099:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.cpp:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[4096];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.cpp:598:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						cpu = atoi( entry );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.cpp:601:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						wallclock = atoi( entry );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.cpp:604:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						exit_code = atoi( entry );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.cpp:871:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/proxymanager.cpp:1013:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[500];
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/unicorejob.cpp:680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char holdReason[1024];
data/condor-8.6.8~dfsg.1/src/condor_had/AbstractReplicatorStateMachine.cpp:96:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char bufArray[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_had/HAD_Version.cpp:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buffer[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_had/HAD_Version.cpp:333:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    temporaryGid = atol( buffer );
data/condor-8.6.8~dfsg.1/src/condor_had/HAD_Version.cpp:344:29:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    temporaryLogicalClock = atol( buffer );
data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		 controllee[128];
data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp:669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char       buffer[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp:894:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp:960:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_had/Transferer.cpp:155:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int stateFilesNumber = atoi(argv[4]);
data/condor-8.6.8~dfsg.1/src/condor_includes/SafeMsg.h:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dataGram[SAFE_MSG_MAX_PACKET_SIZE];/* marshalled packet
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_config.h:371:65:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	HASHITER& operator=(const HASHITER& rhs) { if (this != &rhs) { memcpy(this, &rhs, sizeof(HASHITER)); } return *this; }
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_config.h:517:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		bool open(const char * filename, bool is_command, MACRO_SET& set, std::string &errmsg);
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_config.h:536:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		bool open(const char * src_string, const MACRO_SOURCE & _src);
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_cron_param.h:43:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	mutable char		 m_name_buf[128];
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_crypt_3des.h:65:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char     ivec_[8];
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_crypt_blowfish.h:67:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   ivec_[8];
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_ipv6.WINDOWS.h:34:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dst, &sin.sin_addr, sizeof(sin.sin_addr));
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_ipv6.WINDOWS.h:43:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dst, &sin6.sin6_addr, sizeof(sin6.sin6_addr));
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_ipv6.WINDOWS.h:60:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&sin->sin_addr, src, sizeof(in_addr));
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_ipv6.WINDOWS.h:65:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&sin6->sin6_addr, src, sizeof(in6_addr));
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_pidenvid.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char envid[PIDENVID_ENVID_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_includes/condor_types.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	q_data[1];
data/condor-8.6.8~dfsg.1/src/condor_includes/reli_sock.h:316:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char m_partial_cksum[MAC_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_includes/sock.h:558:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _my_ip_buf[IP_STRING_BUF_SIZE];	
data/condor-8.6.8~dfsg.1/src/condor_includes/sock.h:587:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _peer_ip_buf[IP_STRING_BUF_SIZE];	
data/condor-8.6.8~dfsg.1/src/condor_includes/sock.h:590:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _sinful_peer_buf[SINFUL_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_buffers.cpp:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(_dta, hdr, sz);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_buffers.cpp:180:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&_dta[num_used()], dta, sz);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_buffers.cpp:196:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dta, &_dta[num_touched()], sz);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_buffers.cpp:272:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		last_incr = _curr->get_max(&((char *)dta)[nr], sz-nr);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:300:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dta, data, sz);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:315:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((tw = snd_msg.buf.put_max(&((char *)dta)[nw], sz-nw)) < 0) {
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	        hdr[MAX_HEADER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:410:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	end = (int) ((char *)hdr)[0];
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:411:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&len_t,  &hdr[1], 4);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	        hdr[MAX_HEADER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:476:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hdr[1], &len, 4);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.h:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _peer_ip_buf[IP_STRING_BUF_SIZE];	
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.h:143:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _sinful_peer_buf[SINFUL_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_io/CryptKey.cpp:81:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(keyData_, keyData, keyDataLen_);   
data/condor-8.6.8~dfsg.1/src/condor_io/CryptKey.cpp:134:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(padded_key_buf, keyData_, len);
data/condor-8.6.8~dfsg.1/src/condor_io/CryptKey.cpp:143:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(padded_key_buf, keyData_, keyDataLen_);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:211:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&stemp, &dataGram[9], 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:214:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&stemp, &dataGram[11], 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:217:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ltemp, &dataGram[13], 4);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:220:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&stemp, &dataGram[17], 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ltemp, &dataGram[19], 4);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:226:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&stemp, &dataGram[23], 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:247:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&stemp, data, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:250:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&stemp, data, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:253:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&stemp, data, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:266:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(incomingMD5KeyId_, data, mdKeyIdLen);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:272:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((void*)&md_[0], data, MAC_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:286:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(incomingEncKeyId_, data, encKeyIdLen);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:352:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dta, &data[curIndex], size);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:464:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&data[curIndex], dta, len);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:477:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&dataGram[SAFE_MSG_HEADER_SIZE+where], 
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:481:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&dataGram[SAFE_MSG_HEADER_SIZE+where], mac, MAC_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:488:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&dataGram[SAFE_MSG_HEADER_SIZE+where], 
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:556:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dataGram, SAFE_MSG_MAGIC, 8);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:560:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dataGram[9], &stemp, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:563:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dataGram[11], &stemp, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:566:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dataGram[13], &ltemp, 4);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:569:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dataGram[17], &stemp, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:572:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dataGram[19], &ltemp, 4);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:575:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dataGram[23], &stemp, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:590:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&dataGram[25], THIS_IS_TOO_UGLY_FOR_THE_SAKE_OF_BACKWARD, 4);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:593:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&dataGram[29], &stemp, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:596:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&dataGram[31], &stemp, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:599:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&dataGram[33], &stemp, 2);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:969:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(curDir->dEntry[index].dGram, data, len);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:1043:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(curDir->dEntry[index].dGram, data, len);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:1154:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&dta[total],
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:1277:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(md_, md, MAC_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:1328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[10000];
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:1334:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&str[strlen(str)], "len:%lu, lastNo:%d, rcved:%d, lastTime:%lu\n",
data/condor-8.6.8~dfsg.1/src/condor_io/authentication.cpp:634:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char local_user[256];
data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp:86:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_dta, _dta, _dta_sz);
data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp:136:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(_dta, hdr, sz);
data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp:215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&_dta[num_used()], dta, sz);
data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp:232:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&_dta[num_used()], dta, sz);
data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp:247:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dta, &_dta[num_touched()], sz);
data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp:307:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(checkSUM, md, MAC_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp:374:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		last_incr = _curr->get_max(&((char *)dta)[nr], sz-nr);
data/condor-8.6.8~dfsg.1/src/condor_io/cedar.t.unix.cpp:114:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char serverName[30];
data/condor-8.6.8~dfsg.1/src/condor_io/cedar_no_ckpt.cpp:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[65536];
data/condor-8.6.8~dfsg.1/src/condor_io/cedar_no_ckpt.cpp:478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[65536];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth.cpp:112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output, input, output_len);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth.cpp:129:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output, input, output_len);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth.cpp:174:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(fqu_, remoteUser_, userlen);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth.cpp:177:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(fqu_+userlen+1, remoteDomain_, domlen);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:458:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output + index, &tmp, sizeof(out_data.enctype));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:462:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output + index, &tmp, sizeof(out_data.kvno));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output + index, &tmp, sizeof(out_data.ciphertext.length));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:470:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(output + index, out_data.ciphertext.data,
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:491:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&tmp, input, sizeof(enc_data.enctype));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:495:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&tmp, input + index, sizeof(enc_data.kvno));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:499:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&tmp, input + index, sizeof(enc_data.ciphertext.length));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:533:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(output, out_data.data, output_len);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:609:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char defktname[_POSIX_PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:1030:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(in.s_addr), ticket_->enc_part2->caddrs[0]->contents, sizeof(in_addr));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:1557:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(in.s_addr), (*remoteAddr)[0].contents, sizeof(in_addr));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1116:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(m_t_server.ra, m_t_client.ra, AUTH_PW_KEY_LEN);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1144:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(m_t_client.rb, m_t_server.rb, AUTH_PW_KEY_LEN);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1243:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, t_buf->a, strlen(t_buf->a));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1244:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer+prefix_len+1, t_buf->rb, AUTH_PW_KEY_LEN);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nullstr[2];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1370:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t_client->rb, t_server->rb, AUTH_PW_KEY_LEN);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1543:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer+prefix_len+1, t_buf->ra, AUTH_PW_KEY_LEN);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1544:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer+prefix_len+1+AUTH_PW_KEY_LEN, t_buf->rb, AUTH_PW_KEY_LEN);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1584:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nullstr[2];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1729:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nullstr[2];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_ssl.cpp:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char err_buf[500];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_ssl.cpp:215:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char session_key[AUTH_SSL_SESSION_KEY_LEN];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_ssl.cpp:535:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char errbuf[500];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_ssl.cpp:620:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char subjectname[1024];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_ssl.cpp:792:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[256];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_sspi.cpp:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_sspi.cpp:401:5:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    CopyMemory(*ppvSealedMessage, pvMessage, cbMessage);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_sspi.cpp:450:5:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    CopyMemory(*ppvMessage,
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:480:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char local_user[USER_NAME_MAX] = "";
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:678:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(server, name_buf.value, name_buf.length);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:688:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char comment[1024];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:746:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(comment,"authenticate_self_gss: acquiring self credentials failed. Please check your Condor configuration file if this is a server process. Or the user environment variable if this is a user process. \n");
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:1211:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(gss_name, tmp_buffer->value, tmp_buffer->length);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_crypt.cpp:95:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp, &r, size);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_crypt.cpp:99:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp, &r, length - s);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_crypt.cpp:112:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(hex+i*2,"%02x",bytes[i]);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:399:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[INET6_ADDRSTRLEN];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:861:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ipstr[INET6_ADDRSTRLEN] = { 0, };
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:1234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:1235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[50];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_rw.cpp:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sinbuf[SINFUL_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_rw.cpp:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpbuf[1];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_rw.cpp:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sinbuf[SINFUL_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:54:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hexout[260];  // holds (at least) a 128 byte key.
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:59:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf (&hexout[i*2], "%02x", *dataptr++);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[2];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:238:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[2];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[2];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:580:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fmt[128];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:800:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:875:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		cli_duration = atoi(dur);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:882:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		srv_duration = atoi(dur);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:2188:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				expiration_time = now + atoi(dur);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:2603:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char keybuf[128];
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:441:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer, buf, result);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:606:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dta, data, sz);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:618:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				nw += snd_msg.buf.put_force(&((char *)dta)[nw], sz-nw);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:635:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if (dta && (tw = snd_msg.buf.put_max(&((char *)dta)[nw], sz-nw)) < 0) {
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:685:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dta, data, bytes);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:761:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	        hdr[MAX_HEADER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:804:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	m_end = (int) ((char *)hdr)[0];
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:805:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&len_t,  &hdr[1], 4);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:948:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	        hdr[MAX_HEADER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:957:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&hdr[1], &len, 4);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1069:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fqu[256];
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1089:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sinful_string, ptmp, ptr - ptmp);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1103:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(fqu, ptmp, len);
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:429:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dta, data, sz);
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:502:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dta, dec, readSize);
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:506:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dta, tempBuf, readSize);
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:661:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[50];
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outbuf[50];
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:853:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sinful_string, ptmp, ptr - ptmp);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:679:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cmsg_data,&fd_to_pass,sizeof(int));
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:721:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char procExe[1025];
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:725:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy( procExe, "(readlink failed)" );
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:736:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char procCmdLine[1025];
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:743:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy( procCmdLine, "(unable to read cmdline)" );
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:494:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[200];
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:500:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf+strlen(buf), ".%03d %.100s: %d\n", tv.millitm, msg, err);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:616:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char wake[1];
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:1060:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cmsg_data,&passed_fd,sizeof(int));
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:1087:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&passed_fd,CMSG_DATA( cmsg ),sizeof(int));
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_server.cpp:112:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open( shared_port_server_ad_file.Value(), O_RDONLY );
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_server.cpp:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shared_port_id[512];
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_server.cpp:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_name[512];
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_server.cpp:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char junk[512];
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:1601:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timeout_reason_buf[100];
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:1603:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(timeout_reason_buf,
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:1612:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char will_keep_trying[100];
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:1644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errmsg[150];
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:1664:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errmsg[150];
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2084:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(outbuf,"%d*%d*%d*", len*2, (int)get_crypto_key().getProtocol(),
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2090:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(ptr, "%02X", *kserial);
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2096:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(outbuf,"%d",0);
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2116:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(outbuf,"%d*", len*2);
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2121:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(ptr, "%02X", *kmd);
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2127:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(outbuf,"%d",0);
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pad[INT_SIZE-sizeof(int)], sign;
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1475:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			pad[INT_SIZE-sizeof(int)];
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1524:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pad[INT_SIZE-sizeof(long)], sign;
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1568:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pad[INT_SIZE-sizeof(long)];
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1615:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pad[INT_SIZE-sizeof(int64_t)];
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1667:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pad[INT_SIZE-sizeof(uint64_t)];
data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouter.cpp:349:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[200];
data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouter.cpp:371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[200];
data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouter.cpp:1670:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouter.cpp:1671:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf,"%d.%d",dest_cluster_id,dest_proc_id);
data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouter.cpp:2795:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int nlines = m_route.open(statements, WireMacro);
data/condor-8.6.8~dfsg.1/src/condor_job_router/NewClassAdJobLogConsumer.cpp:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cluster_key[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_job_router/NewClassAdJobLogConsumer.cpp:72:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(cluster_key,"0%d.-1", proc.cluster);
data/condor-8.6.8~dfsg.1/src/condor_job_router/VanillaToGrid_main.cpp:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_job_router/submit_job.cpp:920:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char removeReason[256];
data/condor-8.6.8~dfsg.1/src/condor_job_router/submit_job.cpp:1020:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char holdReason[256];
data/condor-8.6.8~dfsg.1/src/condor_kbdd/XInterface.unix.cpp:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/condor-8.6.8~dfsg.1/src/condor_kbdd/XInterface.unix.cpp:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[80];
data/condor-8.6.8~dfsg.1/src/condor_kbdd/XInterface.unix.cpp:93:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char env[1024];
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:471:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int fd = open( "/dev/null", O_RDONLY );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:480:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open( kernelTuningLogFile.c_str(), O_WRONLY | O_APPEND, 0644 );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:482:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open( kernelTuningLogFile.c_str(), O_WRONLY | O_APPEND | O_CREAT, 0644 );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1000];
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1000];
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:566:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[512];
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:863:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					command_port = atoi(port_arg);
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1475:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1477:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, "signal %d", sig );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1635:30:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			lock_hold_time = (time_t) atol( tmp );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1653:27:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			poll_period = (time_t) atol( tmp );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:2813:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char systemshell[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:2817:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(systemshell,"\\cmd.exe");
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:3180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1439:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char RemoteUser[512];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1447:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RemoteActivity[512];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1482:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char RemoteUser[512];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1509:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RemoteActivity[512];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1560:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value[50];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1561:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(value,"%d",AttrValue);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1577:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value[255];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1578:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(value,"%f",AttrValue);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/accountant_log_fixer.cpp:54:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#	define open _open
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/accountant_log_fixer.cpp:84:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE * infile = fopen(infilename, "rb");
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/accountant_log_fixer.cpp:93:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int outfilefd = open(outfilename.c_str(), O_WRONLY|O_CREAT|O_EXCL|O_BINARY,0644);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/accountant_log_fixer.cpp:143:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:3263:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char curState[80];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:3645:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					adCopy->Assign(ATTR_JOB_PRIO,atoi(prio));
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:5531:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char accountingGroup[256];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:5532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remoteOwner[256];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:5699:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(remoteOwner, "none");
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:6035:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    buffer[255];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:6504:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char globaljobid[200];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:6505:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char scheddName[200];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:6508:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:6544:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char startdname[80],remote_user[80];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:6545:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char globaljobid[200];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:6548:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char scheddName[200];
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:6553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/condor-8.6.8~dfsg.1/src/condor_power/power.cpp:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sinful[16 + 10];
data/condor-8.6.8~dfsg.1/src/condor_power/power.cpp:235:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf ( sinful, "<255.255.255.255:1234>" );
data/condor-8.6.8~dfsg.1/src/condor_power/rooster.cpp:295:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pipe_buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_prio/prio.cpp:100:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			NewPriority = atoi(*argv);
data/condor-8.6.8~dfsg.1/src/condor_prio/prio.cpp:206:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	val = atoi(ptr);
data/condor-8.6.8~dfsg.1/src/condor_prio/prio.cpp:251:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char constraint[100];
data/condor-8.6.8~dfsg.1/src/condor_prio/prio.cpp:296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	constraint[100];
data/condor-8.6.8~dfsg.1/src/condor_privsep/parse_config.unix.cpp:59:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *F = fopen(filename, "r");
data/condor-8.6.8~dfsg.1/src/condor_privsep/parse_config.unix.cpp:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line_buf[MAX_CONFIG_LINE];
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:238:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            (char **) malloc(new_capacity * sizeof(new_list[0]));
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:243:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_list, list->list, list->count * sizeof(new_list[0]));
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:434:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_value, s, trimmed_len);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:718:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        new_fd = open(filename, O_RDONLY);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:722:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        new_fd = open(filename, O_CREAT | O_EXCL | O_WRONLY, open_mask);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:725:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            new_fd = open(filename, O_WRONLY);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:1217:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(path, O_RDONLY);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:1240:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(stat_buf, &tmp_stat_buf, sizeof(struct stat));
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:1289:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    *fd_ptr = open(path, O_RDONLY | O_NONBLOCK);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:1608:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    saved_dir = open(".", O_RDONLY);
data/condor-8.6.8~dfsg.1/src/condor_privsep/switchboard.unix.cpp:1143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *args[2];
data/condor-8.6.8~dfsg.1/src/condor_privsep/switchboard.unix.cpp:1267:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    cmd_fd = atoi(argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_privsep/switchboard.unix.cpp:1268:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    err_fd = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:270:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( path, "/proc/%d/psinfo", pid );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:326:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( path, "/proc/%d/usage", pid );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:492:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:508:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( path, "/proc/%d/smaps", pid );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:546:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[512];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:653:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:661:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[256];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:669:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( path, "/proc/%d/stat", pid );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:714:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	        char line[512];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:828:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:837:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( path, "/proc/%d/environ", pi->pid );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:963:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[256], junk[16];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:1547:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char comm[MAXCOMLEN+1];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:1554:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flags[256];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:1561:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char wchan[256];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:1566:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char groups[256];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:1698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAXPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:1700:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(path,"/proc/%d/status",pid);
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:2565:25:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				temp->pid = (pid_t) atol ( direntp->d_name );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_t.cpp:63:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char jobname[512];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[128];
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:95:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "THIS_PID = %d", pi->pid );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:97:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "PARENT_PID = %ld", (long)pi->ppid );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:99:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "IMAGE_SIZE = %ld", (long)pi->imgsize );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:101:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "RESIDENT_SET_SIZE = %ld", (long)pi->rssize );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:105:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf ( line, "PROPORTIONAL_SET_SIZE = %ld", (long)pi->pssize );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:109:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "MAJOR_PAGE_FAULTS = %ld", (long)pi->majfault );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:111:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "MINOR_PAGE_FAULTS = %ld", (long)pi->minfault );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:113:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "USER_TIME = %ld", (long)pi->user_time );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:115:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "SYSTEM_TIME = %ld", (long)pi->sys_time );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:117:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "PROCESS_AGE = %ld", (long)pi->age );
data/condor-8.6.8~dfsg.1/src/condor_procapi/procinterface.cpp:119:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf ( line, "PERCENT_CPU_USAGE = %6.2f",  pi->cpuusage );
data/condor-8.6.8~dfsg.1/src/condor_procd/cgroup_tracker.linux.cpp:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[32];
data/condor-8.6.8~dfsg.1/src/condor_procd/cgroup_tracker.linux.cpp:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_procd/dprintf_lite.cpp:35:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char timebuf[80];
data/condor-8.6.8~dfsg.1/src/condor_procd/dprintf_lite.cpp:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		old[MAXPATHLEN + 4];
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:45:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char err_str[ERR_STRLEN + 1];
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:76:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path, proc, proclen);
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:77:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path + proclen, pid, pidlen);
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path + proclen + pidlen, status, statuslen);
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:148:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE* fp = fopen(path, "r");
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/condor-8.6.8~dfsg.1/src/condor_procd/glexec_kill.unix.cpp:26:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char glexec_retries_str[50];
data/condor-8.6.8~dfsg.1/src/condor_procd/glexec_kill.unix.cpp:27:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char glexec_retry_delay_str[50];
data/condor-8.6.8~dfsg.1/src/condor_procd/glexec_kill.unix.cpp:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char target_pid_str[10];
data/condor-8.6.8~dfsg.1/src/condor_procd/glexec_kill.unix.cpp:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sig_str[10];
data/condor-8.6.8~dfsg.1/src/condor_procd/group_tracker.linux.cpp:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[32];
data/condor-8.6.8~dfsg.1/src/condor_procd/group_tracker.linux.cpp:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_procd/group_tracker.linux.cpp:141:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ProcFamily* family = m_gid_pool.get_family((gid_t)atoi(token));
data/condor-8.6.8~dfsg.1/src/condor_procd/local_client.UNIX.cpp:152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, &m_pid, sizeof(pid_t));
data/condor-8.6.8~dfsg.1/src/condor_procd/local_client.UNIX.cpp:154:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, &m_serial_number, sizeof(int));
data/condor-8.6.8~dfsg.1/src/condor_procd/local_client.UNIX.cpp:156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, payload_buf, payload_len);
data/condor-8.6.8~dfsg.1/src/condor_procd/local_server.UNIX.cpp:100:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		client_uid = atoi(uid_str);
data/condor-8.6.8~dfsg.1/src/condor_procd/login_tracker.cpp:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char user_buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_procd/login_tracker.cpp:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char domain_buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family.cpp:497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line_contents[BLOCK_STATS_LINE_MAX], sep[]=" ", *tok_handle, *word, *info[3];
data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family.cpp:550:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line_contents[BLOCK_STATS_LINE_MAX], sep[]=" ", *tok_handle, *word, *info[3];
data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_client.cpp:230:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, login, login_len);
data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_client.cpp:401:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void *)ptr, (const void *)cgroup, sizeof(char)*cgroup_len);
data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_client.cpp:458:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, proxy, proxy_len);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:208:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pid_t pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:209:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pid_t watcher = atoi(argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:210:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int max_snapshot_interval = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:238:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	gid_t gid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:245:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:279:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:317:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:367:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:412:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:457:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int signal = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:464:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:495:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:526:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:557:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_ctl.cpp:586:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pid_t pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_main.cpp:215:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				log_size = atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_main.cpp:225:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				max_snapshot_interval = atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_main.cpp:243:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				root_pid = atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_main.cpp:265:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				min_tracking_gid = (gid_t)atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_main.cpp:267:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				max_tracking_gid = (gid_t)atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_main.cpp:295:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				glexec_retries = atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_procd/procd_main.cpp:297:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				glexec_retry_delay = atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:333:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char		constraint[4096];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:372:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char return_buff[LONG_BUFFER_SIZE * 100];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		scheddMachine[64];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:655:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf( scheddMachine, "Unknown" );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:743:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp_char[8];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:744:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
						strcpy(tmp_char, "Unknown");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1242:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				testing_width = atoi(++pcolon);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1903:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						dash_batch = atoi(popt);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2307:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char str[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2339:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char put_result[3];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2503:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[sizeof(NiceUserName)+2];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2562:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char result_str[64];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2563:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(result_str, " %7.7s", GlobusJobStatusName( globusStatus ) );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2600:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	host[80] = "[?????]";
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2601:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	jm[80] = "fork";
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2648:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( jm, "Fork" );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2726:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char result[64];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2727:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char grid_res[64];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2789:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char result_str[1024];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2792:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char rvm[MAXHOSTNAMELEN];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char grid_res[64];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3018:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char time_str[80]; time_str[0] = 0;
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3437:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char achJobId[16], achAutocluster[16], achRunning[16];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3441:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(achJobId, "%d.%d", cluster_id, proc_id);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3461:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
							sprintf(achAutocluster, "%d:%d/%d", it->first, cJobsToInc, cIdle);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3463:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
							sprintf(achAutocluster, "%d/%d", cJobsToInc, cIdle);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3474:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					if (cRunning) { sprintf(achRunning, "%d/", cRunning); }
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3475:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(achRunning+strlen(achRunning), "%d", ac.machinesRunningUsersJobs);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4022:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[30];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4044:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[20];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4045:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%d", max_cluster);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4047:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%d", max_proc);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4961:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[64];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  	attrName[32], attrPrio[32];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5110:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  	char  	name[128];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5138:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( attrName , "Name%d", cPrios+1 );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5139:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( attrPrio , "Priority%d", cPrios+1 );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5167:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			id = atoi(p);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	owner[128];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[128];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5574:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat( return_buff, "No successful match recorded.\n" );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5623:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5644:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat( return_buff,
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5651:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat( return_buff, "\nWARNING:  Be advised:\n");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5653:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat( return_buff, "   No machines matched the jobs's constraints\n");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5655:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(return_buff, "   Job did not match any machines's constraints\n");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5656:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(return_buff,
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5679:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char request_id[33];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5680:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(request_id, "%d.%03d", jid.cluster, jid.proc);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5765:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ana_buffer[SHORT_BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5862:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(return_buff, "%-24.24s  is offline\n", slotname.c_str());
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5948:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(return_buff, "\nThe Requirements expression for this slot is\n\n    ");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5950:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(return_buff, "\n\n");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5976:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(return_buff, "\nThe Requirements expression for this slot reduces to these conditions:\n\n");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6004:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fmt[sizeof("%-nnn.nnns %-4s %12d %12d %10.2f\n")];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6006:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fmt, "%%-%d.%ds", MAX(name_width, 16), MAX(name_width, 16));
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6007:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(fmt, " %-4s %12d %12d %10.2f\n");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6069:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static	char buffer[128];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		query_constraint[1024];
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6185:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(host, "host=");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6189:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(port, "port=");
data/condor-8.6.8~dfsg.1/src/condor_release/examples/dagman/sum.c:42:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen( filename, "r" );
data/condor-8.6.8~dfsg.1/src/condor_release/examples/env.cpp:44:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	data = new char *[ max ];
data/condor-8.6.8~dfsg.1/src/condor_release/examples/env.cpp:54:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	data = new char *[ max ];
data/condor-8.6.8~dfsg.1/src/condor_release/examples/io.c:54:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	count = atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_release/examples/io.c:60:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( (fd=open("tmp",O_CREAT|O_TRUNC|O_RDWR,0664)) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_release/examples/loop.c:50:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if( (count=atoi(argv[1])) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[32];
data/condor-8.6.8~dfsg.1/src/condor_rmdir/bprint.h:167:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
   UINT cch = MultiByteToWideChar(CP_ACP, 0, pszNew, cchNew, psz, bp.cchMax - bp.cch);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:227:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szDomain[32]; // max domain name is actually 15
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:229:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szName[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:800:13:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            TCHAR szParent[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:881:13:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            TCHAR szParent[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:1045:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szCanonPath[MAX_PATH+1];
data/condor-8.6.8~dfsg.1/src/condor_rmdir/condor_rmdir.cpp:1058:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szFullPath[MAX_PATH + NUMCHARS(szPre)];
data/condor-8.6.8~dfsg.1/src/condor_rmdir/main.cpp:150:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR           szPathName[2];
data/condor-8.6.8~dfsg.1/src/condor_rmdir/main.cpp:302:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR      szTempArg[64]; // temp if we need to copy and arg
data/condor-8.6.8~dfsg.1/src/condor_rmdir/main.cpp:487:4:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   CopyMemory(polf->szPathName, pszPath, cbPath);
data/condor-8.6.8~dfsg.1/src/condor_rmdir/main.cpp:821:12:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         ((TCHAR *)_pszModuleName)[-1] = 0;
data/condor-8.6.8~dfsg.1/src/condor_rmdir/main.cpp:892:10:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         TCHAR szCmd[128];
data/condor-8.6.8~dfsg.1/src/condor_rmdir/tokenize.cpp:146:4:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   CopyMemory(pszToken, pszInput, (cch+1) * sizeof(TCHAR));
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/autocluster.cpp:769:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:530:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:873:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name_buf[256];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:3173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_buf[256];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:3585:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char namebuf[1024];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:3689:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_buf[512];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:3899:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:4161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char state[128];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:4350:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arch[128], opsys[128], name[128];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.cpp:532:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			fname_pid = atoi(dot);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.h:60:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char owner[200];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.h:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char domain[200];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/job_transforms.cpp:128:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if ( (rval=xfm->open(statements, ArgumentMacro)) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/prio_rec.h:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        owner[MAX_CONDOR_USERNAME_LEN];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:784:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *AttrsToModify[ATTR_ARRAY_SIZE] = { 
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:1346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:2025:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cluster_str[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:2583:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3136:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if( atoi(attr_value) == IDLE ) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3424:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[MYPROXY_MAX_PASSWORD_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3463:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[2];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3574:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char number[10];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3577:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(number, "%d", mit->second);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4352:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy(tvalue,"$$(OPSYS).$$(ARCH)");
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4688:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4817:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *AttrsToModify[ATTR_ARRAY_SIZE] = {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4829:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *AttrXferBool[ATTR_ARRAY_SIZE] = {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4837:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_attr_name[500];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:5372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    owner[100];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:5799:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		qsort( (char *)PrioRec, N_PrioRecs, sizeof(PrioRec[0]),
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.h:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char job_id_str[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt_common.cpp:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt_common.cpp:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt_common.cpp:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt_common.cpp:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgr_job_updater.cpp:426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_str[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:4047:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ulog->AddToMask(ULogEventNumber(atoi(mask)));
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:5442:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:6764:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char owner[200], *ownerptr = owner;
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:9760:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char condor_id_string[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:11092:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[40];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:15445:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char claim_id[155];	
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:15447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char job_owner[150];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:16512:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char restart_time_str[80];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_negotiate.cpp:462:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				m_current_auto_cluster_id = atoi(ac);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_td.cpp:746:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_attr_value[500];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd_td.cpp:1352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_attr_value[500];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/shadow_mgr.cpp:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:194:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&transaction,info,sizeof(condor__Transaction));
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:501:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(intPtr,transaction,sizeof(condor__Transaction));
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:65:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *n = fopen("nodes", "r");
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:66:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *m = fopen("machines", "w");
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:96:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(command, "mpirun -np %d -machines machines ", count);
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:54:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	return sprintf(line,"%lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld\n",
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:81:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	return sprintf(line,"%lld %lld %lld %lld %lld %lld %lld\n",
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1367:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1469:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			rval = sprintf(buffer, "CONDOR");
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1513:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			rval = sprintf(buffer, "UNKNOWN");
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1554:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1776:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1819:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1957:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1994:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:747:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:871:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				uLog.AddToMask(ULogEventNumber(atoi(mask)));
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/mpiresource.cpp:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char contact_buf[40];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/parallelshadow.cpp:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/parallelshadow.cpp:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/parallelshadow.cpp:725:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[9];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/pseudo_ops.cpp:165:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:179:23:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*expiration_time = atol( buf );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1621:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1660:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:1914:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[64];
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:2011:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char contact_buf[40];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/job_report.cpp:83:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(text, " - ");
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:355:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[BUFSIZ * 2 + 2];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/ops.cpp:73:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char MsgBuf[ BUFSIZ ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/ops.cpp:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ BUFSIZ ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/ops.cpp:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ BUFSIZ ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/ops.cpp:132:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char oldbuf[ BUFSIZ + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/ops.cpp:187:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( oldbuf, &buf[nli], len-nli );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:111:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char Executing_Filesystem_Domain[ MAX_STRING ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:112:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char Executing_UID_Domain[ MAX_STRING ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:247:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( &JobRusage, use_p, sizeof(struct rusage) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:329:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( &uncommitted_rusage, use_p, sizeof(struct rusage) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:342:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(use_p, &Proc->remote_usage[0], sizeof(struct rusage) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:378:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ CONDOR_IO_BUF_SIZE ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:442:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ CONDOR_IO_BUF_SIZE ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:510:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( p, (PROC *)Proc, sizeof(PROC) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:532:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( kill_sig, &soft_kill, sizeof(soft_kill) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:553:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(test_path, ".tmp");
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1854:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char job_version[150];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1975:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *servers[5] = 
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:2047:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( &JobRusage, rusagep, sizeof(struct rusage) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:182:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	CkptName[ MAXPATHLEN ];		/* The name of the ckpt file */
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:183:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	ICkptName[ MAXPATHLEN ];	/* The name of the initial ckpt file */
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:184:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	RCkptName[ MAXPATHLEN ];	/* The name of the returned ckpt file */
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:185:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	TmpCkptName[ MAXPATHLEN ];	/* The name of the temp ckpt file */
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:187:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	ErrBuf[ 1024 ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:545:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char notification[1024*50] = {'\0'};
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:571:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(Proc->exit_status[0]),&JobStatus,sizeof((Proc->exit_status[0])));
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:690:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( SyscallLabel, "shadow" );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:727:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char notification[ BUFSIZ ];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:764:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(Proc->exit_status[0]),&JobStatus,sizeof((Proc->exit_status[0])));
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:786:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:787:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf2[4096];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:853:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:854:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf2[4096];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:932:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tstartup_local, &Proc->local_usage, sizeof(struct rusage));
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:933:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tstartup_remote, &Proc->remote_usage[0],
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:936:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&Proc->local_usage,&tstartup_local,sizeof(struct rusage));
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:942:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&Proc->remote_usage[0],&tstartup_remote,
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:957:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024*50];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1251:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	Proc->id.cluster = atoi( cluster_id );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1252:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	Proc->id.proc = atoi( proc_id );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1254:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	cluster_num = atoi( cluster_id );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1255:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	proc_num = atoi( proc_id );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1404:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	host[1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1566:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char names[2][1024];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1611:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	clusternum = atoi(cluster);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1612:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	procnum = atoi(proc);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1624:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(names[1], ".tmp");
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:132:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char subject[ BUFSIZ ];	
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:136:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( subject, "Condor Job %d.%d", 
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char subject[ BUFSIZ ];	
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:377:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( subject, "Condor Job %d.%d put on hold\n", 
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:531:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			(void)sprintf( notification, "is not executable." );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:535:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				(void)sprintf(notification,
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:540:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			(void)sprintf(notification, "exited with status %d.",
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:648:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			(void)sprintf(notification,
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow_common.cpp:1004:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ATTRLIST_MAX_EXPRESSION];
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/structproc.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			pad[66];			/* make at least as big as V2 proc */
data/condor-8.6.8~dfsg.1/src/condor_soapshell/soapshell_main.cpp:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[60];
data/condor-8.6.8~dfsg.1/src/condor_soapshell/soapshell_main.cpp:167:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf,"INPUT_FILE_NAME_%d",i);
data/condor-8.6.8~dfsg.1/src/condor_soapshell/soapshell_main.cpp:170:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf,"INPUT_FILE_DATA_%d",i);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/AvailStats.cpp:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[100];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/AvailStats.cpp:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1025];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/CondorSystrayNotifier.windows.cpp:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char psBuf[256];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/LoadQueue.cpp:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char numbuf[64];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResAttributes.cpp:228:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			options = atoi(pkey);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResAttributes.cpp:299:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               DWORD dw = atoi(pszVal);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResMgr.cpp:691:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*)cache, (void*)resources, (sizeof(Resource*)*ncache));
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResMgr.cpp:1628:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( (void*)new_resources, (void*)resources,
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResMgr.cpp:1644:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int slot_type = atoi(rip->r_pair_name+1);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResMgr.cpp:2368:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if( !request_id.empty() && atoi(request_id.c_str()) != this->draining_id ) {
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Resource.cpp:311:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int pair_type = atoi(r_pair_name+10);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Resource.cpp:317:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(r_pair_name, "#%d", pair_type);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Resource.cpp:2489:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        death_time = atoi( death_time_string );
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/claim.cpp:405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/claim.cpp:409:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( buf, "1.0" );
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/claim.cpp:1008:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char to_schedd[256];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/claim.cpp:1092:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char to_schedd[256];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/claim.cpp:2340:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/command.cpp:1576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RemoteOwner[512];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/command.cpp:1956:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &stRec.ip_addr, &local_in_addr, sizeof(struct in_addr) );
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/glexec_starter.linux.cpp:384:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char err[256];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/glexec_wrapper.cpp:180:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open("/dev/null", O_RDONLY);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_cron_job_params.cpp:61:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		unsigned	slotno = atoi( slot );
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_hibernator.cpp:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/starter_mgr.cpp:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/vmuniverse_mgr.cpp:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&m_vm_alive_pinfo, pi, sizeof(struct procInfo));
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/vmuniverse_mgr.cpp:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[2048];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ach[5]	= {0};
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:296:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char szMsg[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:375:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char szMsg[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:385:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char sz[20] = "";
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:431:6:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					TCHAR szName[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:446:6:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					TCHAR szName[MAX_PATH]; 
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:491:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pszAttr + cchPrefix, pszKeyName, cch);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:552:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(pszT, "Percent");
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:558:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(pszT, "_Per_S");
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:884:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char szMsg[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:905:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					DWORD ix = atoi(pszIndex);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sz[64];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1289:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sz, "%I64d     ", val);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1291:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sz, "0x%I64X     ", val);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1293:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sz, "0x%X     ", *(DWORD*)&val);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1360:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sz, "%f sec ", value);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1374:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sz, "%f     ", value);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1424:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				query.idInst = atoi(pszInst);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1436:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		query.idKey = atoi(pszRegKey);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1444:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			query.idKey = atoi(pszPerfIndex);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1451:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			query.idCounter = atoi(pszValueName);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1464:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					((DWORD*)&query.idCounter)[ix++] = atoi(pszCounterIndex);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1488:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		cch = sprintf(psz, "%f", value.d);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1546:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szKeyID[12];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1577:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char szMsg[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1626:4:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			CopyMemory(pdataT, pdataOld, result.cbAlloc);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1439:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pipe_buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(setup_output+setup_output_len,pipe_buf,n);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:1625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char const *std_fname[3];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:3410:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (*tmp) slot_number = atoi(tmp);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/condor_pid_ns_init.cpp:74:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *f = fopen(filename, "w");
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/glexec_privsep_helper.linux.cpp:664:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char err[256];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char check_cookie[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:121:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",CHIRP_ERROR_NOT_AUTHENTICATED);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newpath[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flags_string[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expr[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:277:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:294:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:323:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",result);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:329:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:335:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:341:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:347:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:353:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:361:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%u",(unsigned int)strlen(url));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:365:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:393:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:398:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:405:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%u",(unsigned int)strlen(recv_expr));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:409:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:419:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%u",(unsigned int)value.size());
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:423:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",convert(-1,ENOENT));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:429:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:437:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:444:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:454:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:456:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line,"%d",CHIRP_ERROR_INVALID_REQUEST);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:460:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:467:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:482:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:490:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:497:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:508:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:510:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line,"%d",CHIRP_ERROR_INVALID_REQUEST);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:514:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:525:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:532:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:545:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:547:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line,"%d",CHIRP_ERROR_INVALID_REQUEST);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:551:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:558:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:566:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:573:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:582:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:589:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:596:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:602:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:608:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:615:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",convert(result,errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:627:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:637:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:641:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:650:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:660:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:671:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:678:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:686:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:693:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:700:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:706:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:713:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:725:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:732:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:741:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:748:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:757:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:764:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(line,"%d",CHIRP_ERROR_NO_MEMORY);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:771:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:777:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:783:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:789:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:795:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:801:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line, "%d", convert(result, errno));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:805:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(line,"%d",CHIRP_VERSION);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:809:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(line,"%d",CHIRP_ERROR_INVALID_REQUEST);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:871:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp_path[CHIRP_LINE_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/java_proc.cpp:232:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[11]; // enough for "abnormal"
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char param_name[256];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char param_name[256];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:273:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	univ = atoi( tmp );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char univ_str[32];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_local_config.cpp:300:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( univ_str, "%d", univ );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:1232:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char nobody_param[20];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2045:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[200];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[32];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2574:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ccfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2604:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2605:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2704:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ccfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2725:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sandboxccfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2726:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sandboxcctmpfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:2766:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&m_sandbox_creds_last_update, &syscred.st_mtime, sizeof(time_t));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/local_user_log.cpp:159:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				mask_vec.push_back(ULogEventNumber(atoi(mask)));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.cpp:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.cpp:84:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%d", Node);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.cpp:96:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%d", machine_count);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_comrade_proc.cpp:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_master_proc.cpp:181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char shad[128], foo[128];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_master_proc.cpp:279:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/mpi_master_proc.cpp:301:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			port = atoi( buf );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/os_proc.cpp:999:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		mask[index++] = atoi(cpu);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.cpp:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.cpp:95:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%d", Node);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.cpp:107:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%d", machine_count);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/parallel_proc.cpp:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter_v61_main.cpp:564:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			job_cluster = atoi( arg );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter_v61_main.cpp:575:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			job_proc = atoi( arg );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter_v61_main.cpp:586:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			job_subproc = atoi( arg );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/stream_handler.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[STREAM_BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/tool_daemon_proc.cpp:200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pid_buf[256];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/tool_daemon_proc.cpp:201:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(pid_buf, "%d", ApplicationPid);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.cpp:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/user_proc.h:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char const *m_pre_defined_std_fnames[3]; // NULL if not defined
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:359:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[16];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:360:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "%d", getpid());
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:365:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const char dir_delim[2] = {DIR_DELIM_CHAR, '\0'};
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:1173:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int oom_score_fd = open("/proc/self/oom_score_adj", O_WRONLY | O_CLOEXEC);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:1181:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			oom_score_fd = open("/proc/self/oom_adj", O_WRONLY | O_CLOEXEC);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:1264:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	m_oom_fd = open(oom_control_str.c_str(), O_RDONLY | O_CLOEXEC);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:1271:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int event_ctrl_fd = open(event_control_str.c_str(), O_WRONLY | O_CLOEXEC);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:1280:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int oom_fd2 = open(oom_control_str.c_str(), O_WRONLY | O_CLOEXEC);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:525:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vmgahp_version[360];
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:750:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[2049];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/driver.cpp:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/driver.cpp:42:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( (fp=fopen(argv[1],"r")) == NULL ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_common.cpp:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 	addr[128];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_main.cpp:627:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[4096];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:72:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		StarterPid = (pid_t)atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	cmd[ 1024];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:250:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			return atoi(ptr);
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:130:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		i = atoi(ptmp);
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:468:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[128];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:495:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, "%d", pipe_fds[READ_END] );
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1222:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char temp[19];
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1531:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[60];
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1532:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.3f", fl);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1540:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[60];
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1612:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sa[4] = "  ";
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1689:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char ret[9+12+2];
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:192:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char		buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char state[32];
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:420:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char keybuf[64] = " ";
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:448:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[32];
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:634:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ast[4] = {0,0,0,0}, bst[4] = {0,0,0,0};
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:796:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buffer, "PartitionableSlot =?= true || DynamicSlot =!= true");
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:1136:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char info[1000];
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:1527:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				forced_display_width = atoi(++pcolon);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:295:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ClusterString[20]="1", ProcessString[20]="0", StepString[20]="0", RowString[20]="0", EmptyItemString[] = "";
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:845:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char loc[100];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:847:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case PHASE_READ_SUBMIT: sprintf(loc, " on Line %d of submit file", FileMacroSource.line); break;
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:848:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case PHASE_DASH_APPEND: sprintf(loc, " with -a argument #%d", ExtraLineNo); break;
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:849:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case PHASE_QUEUE:       sprintf(loc, " at Queue statement on Line %d", FileMacroSource.line); break;
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:850:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	case PHASE_QUEUE_ARG:   sprintf(loc, " with -queue argument"); break;
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1052:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if( atoi(univ) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1053:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return atoi(univ);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1316:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int opt = atoi(pcolon+1);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1617:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char userdom[256];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1969:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char jobid[40];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:1987:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(jobid,"%d.0",ClusterId);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2305:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume[8];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netuser[80];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2307:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char name_info_buf[MAX_PATH+1];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2316:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(volume,"%c:",path[0]);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char my_name[255];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2976:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tmp = atoi(mach_count);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2995:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			int tmp = atoi(mach_count);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:3108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    buff[2048];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:4364:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		prioval = atoi (prio);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:4859:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		len = atoi(tmp);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:6073:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		coresize = atoi(size);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7104:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		signo = atoi(sig);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7176:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		buffer.formatstr( "%s=%d", ATTR_KILL_SIG_TIMEOUT, atoi(timeout) );
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7246:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sz[16*3];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7250:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		if (flags&2) { p += sprintf(p,"%d", start); }
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7252:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		if (flags&4) { p += sprintf(p,"%d", end); }
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7254:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		if (flags&8) { p += sprintf(p,"%d", step); }
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tokenbuf[sizeof("matching")+1] = ""; // temporary buffer to hold a potential keyword while scanning
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:8329:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ClusterString[20]="1", ProcessString[20]="0", EmptyItemString[] = "";
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:8539:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void)sprintf(ClusterString, "%d", ClusterId);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:8540:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void)sprintf(ProcessString, "%d", ProcId);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:8543:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void)sprintf(RowString, "%d", item_index);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:8544:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void)sprintf(StepString, "%d", ii);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:8587:46:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			if (JobUniverse == CONDOR_UNIVERSE_MPI) { strcpy(ParallelNodeString, "#MpInOdE#"); }
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:9699:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char preview[64];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:9706:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char userdom[256];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:10021:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tbuf[200];
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:10984:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if (slice.initialized()) { char sz[16*3]; slice.to_string(sz, sizeof(sz)); fprintf(stderr, " slice: %s", sz); }
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_info[7+10+10] = "UNKNOWN";
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:131:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp_info, "WIN32s%d%d", info.dwMajorVersion, info.dwMinorVersion);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:134:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp_info, "WIN32%d%d", info.dwMajorVersion, info.dwMinorVersion);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:137:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp_info, "WINNT%d%d", info.dwMajorVersion, info.dwMinorVersion);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:493:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ver_str[255];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_info[262];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:580:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_info[strlen(tmp_opsys_short_name) + 1 + 10];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:607:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp_str[200] = {0};
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:610:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( tmp_str, "Unknown" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:736:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:737:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ver[24];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:793:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( tmp, "HPUX" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:864:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_opsys_versioned[strlen(tmp_opsys) + 1 + 10];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:926:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:949:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "ALPHA" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:952:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "INTEL" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:955:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "INTEL" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:958:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "INTEL" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:961:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "INTEL" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:975:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char val[32];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:979:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "INTEL" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:983:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( tmp, "X86_64" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:986:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "INTEL" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:990:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "IA64" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:993:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "X86_64" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1000:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "X86_64" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1003:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "SUN4u" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1006:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "SUN4x" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1009:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "SUN4x" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1012:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "SUN4x" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1015:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "PPC" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1018:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "PPC" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1021:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "PPC" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1024:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( tmp, "PPC64" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char d[3];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry.h:360:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define structassign(d, s)      memcpy(&(d), &(s), sizeof(d))
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry.h:392:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char    Str_30 [31];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry.h:404:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char        Str_Comp [31];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry.h:408:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  char        Str_2_Comp [31];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry21a.cpp:127:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((Ap = fopen("dhry.res","a+")) == NULL)
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry21a.cpp:142:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (Ptr_Glob->variant.var_1.Str_Comp, 
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry21a.cpp:144:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (Str_1_Loc, "DHRYSTONE PROGRAM, 1'ST STRING");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry21a.cpp:191:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (Str_2_Loc, "DHRYSTONE PROGRAM, 2'ND STRING");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry21a.cpp:214:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy (Str_2_Loc, "DHRYSTONE PROGRAM, 3'RD STRING");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/dhry21a.cpp:245:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(Reg_Define, "Register option not selected.");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/free_fs_blocks_t.cpp:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filename[512];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp:382:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pathname[100];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp:442:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char pathname[100] = "/dev/";
data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp:564:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFFER_SIZE], *tok, *tok_loc;
data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp:588:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				dprintf( D_IDLE, "Keyboard IRQ: %d\n", atoi(buf) );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp:619:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFFER_SIZE], *tok, *tok_loc;
data/condor-8.6.8~dfsg.1/src/condor_sysapi/idle_time.cpp:650:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		   		dprintf(D_FULLDEBUG, "Mouse IRQ: %d\n", atoi(buf));
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:296:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char counterpath[35];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:339:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(counterpath, "\\Processor(%d)\\%% Processor Time", i);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:566:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char upt_path[16];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:570:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(upt_path, "/usr/ucb/uptime");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:575:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(upt_path, "/usr/bin/uptime");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:580:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(upt_path, "/usr/bsd/uptime");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:594:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char word[20];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/load_avg.cpp:605:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *args[2] = {uptime_path, NULL};
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus.cpp:386:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi( str );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus.cpp:406:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		 buf[1024];				/* Input line buffer */
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus.cpp:407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		 buf_copy[1024];		/* Copy of the above */
data/condor-8.6.8~dfsg.1/src/condor_sysapi/net_dev_info.cpp:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_buf[INET6_ADDRSTRLEN];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/net_dev_info.cpp:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_buf[INET6_ADDRSTRLEN];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/phys_mem.cpp:230:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		memory_size += atoi(mem_ent.value);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.cpp:272:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				linux_num = atoi( argv[i+2] );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.cpp:478:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[256];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.cpp:479:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	uname[256];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/virt_mem.cpp:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/vsyscall_gate_addr.cpp:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/vsyscall_gate_addr.cpp:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addr[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:29:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char				Hostname[512];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				my_buf[MAXPATHLEN+1];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				pathname[MAXPATHLEN+1];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			path[MAXPATHLEN+1];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			maps_to[MAXPATHLEN+1];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_startup.c:252:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	ckpt_file = (char *)malloc(strlen(argv[0])+6);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_startup.c:529:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_startup.c:531:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*argv[256];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_startup.c:804:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*logical_name[3];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/special_stubs.cpp:131:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*low_port = atoi(low);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/special_stubs.cpp:132:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*high_port = atoi(high);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/special_stubs.cpp:226:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char ipbuf[INET6_ADDRSTRLEN] = {0,};
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:69:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
REMAP_THREE_VARARGS( open, __open, int, const char *, int, int )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:103:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
REMAP_TWO_VARARGS( open, __open_nocancel, int, const char * , int )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:112:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
REMAP_THREE_VARARGS( open, __libc_open, int, const char *, int, int )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:152:13:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
REMAP_ZERO( vfork, __vfork, pid_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:471:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(dstpp, srcpp, len);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:483:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return memcpy(dstpp, srcpp, len);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:745:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	return (wchar_t *) memcpy ((char *) s1, (char *) s2, n * sizeof (wchar_t));
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            d_name[256]; 
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				d_name[256];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:452:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return open(path, O_WRONLY | O_CREAT | O_TRUNC, mode);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1920:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(str, " ; ");
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1923:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(str, " ; ");
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1949:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[4];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/xfer_file.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ CHUNK_SIZE + 50 ];
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/xfer_file.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ CHUNK_SIZE + 50];
data/condor-8.6.8~dfsg.1/src/condor_tests/appendmsg.cpp:491:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100]; char * p;
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_combo-sanity_std.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ 1024 ];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_combo-sanity_std.c:48:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		num_tests = atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_combo-sanity_std.c:59:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( (fp=fopen( "job_ckpt_combo-sanity_std.results", "w" )) == NULL ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_combo-sanity_std.c:67:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "set i = %d\n", i);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_combo-sanity_std.c:92:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "j = %d, k (register) = %d\n", j, k);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_dup_std.c:65:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	x = open( argv[1], O_RDONLY, 0 );		/* should get 3 */
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_dup_std.c:66:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	a = open( argv[1], O_RDONLY, 0 );		/* should get 4 */
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_dup_std.c:67:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	b = open( argv[1], O_RDONLY, 0 );		/* should get 5 */
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_env_std.cpp:47:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	data = new char *[ max ];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_env_std.cpp:55:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	data = new char *[ max ];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_floats-async_std.c:45:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		num_secs = atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_getrusage-loop_std.cpp:87:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if( (count=atoi(argv[1])) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_getrusage-loop_std.cpp:93:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if( (count=atoi(argv[1])) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_getrusage-loop_std.cpp:96:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if( (ckptfreq=atoi(argv[2])) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_gettimeofday_std.c:72:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		num_tests = atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-async_std.c:54:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-async_std.c:72:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	count = atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-async_std.c:79:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( (fd=open(tmp_dir,O_CREAT|O_TRUNC|O_RDWR,0664)) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async-compressed_std.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[RECORD_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async-compressed_std.c:55:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	in = fopen(argv[1],"wb");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async-compressed_std.c:72:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	in = fopen(argv[1],"rb");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async-compressed_std.c:78:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out = fopen(argv[2],"wb");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async-compressed_std.c:107:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out = fopen(argv[2],"rb");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async_std.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[RECORD_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async_std.c:55:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	in = fopen(argv[1],"wb");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async_std.c:72:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	in = fopen(argv[1],"rb");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async_std.c:78:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out = fopen(argv[2],"wb");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-buffer-async_std.c:107:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out = fopen(argv[2],"rb");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c:157:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_CREAT | O_TRUNC | O_WRONLY, S_IRUSR | S_IWUSR);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c:229:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(file, O_RDONLY);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file[1024] = {'\0'};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c:286:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gigs = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c:293:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(file, "./lfs-test.%u", (unsigned int)getpid());
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_longjmp_std.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ 1024 * 1024 ];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_memory-file_std.cpp:115:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				filesize=atol(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_memory-file_std.cpp:121:16:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				operations=atol(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_memory-file_std.cpp:127:16:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				random_key=atol(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_memory-file_std.cpp:149:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(filename,O_CREAT|O_RDWR|O_TRUNC,0600);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_open-N-parallel_std.c:61:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	dummy = open("/dev/zero", O_RDONLY, 0);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_open-N-parallel_std.c:64:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if( (fd=open(argv[i],O_RDONLY,0)) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_open-async-ckpt_std.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pathname[1024];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_open-async-ckpt_std.c:39:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen("output", "w");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char method[URL_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server[URL_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[URL_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c:68:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	loops = atoi(argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filebuff[10000];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filenmbuf[1024];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newfilenmbuf[1024];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tstmessage[20];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char chktstmessage[20];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_compressfiles.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_compressfiles.c:44:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rfd = open(testfilein,O_RDONLY,0);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_compressfiles.c:45:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	wfd = open(testfileout,O_WRONLY| O_CREAT,0666);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:2009:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	passed = handle_gez(ret = open(path, oflags, mode));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:2051:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	passed = handle_ptr(fp = fopen(file, mode));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:2083:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int utimes_test(char *filename, struct timeval tvp[2])
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3029:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	passed = handle_ptr(ret = tmpfile());
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3332:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readbuf[sizeof(passage)] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3560:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3612:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3617:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readbuf[sizeof(passage)] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3673:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3678:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readbuf[sizeof(passage)] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3734:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3763:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3831:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3901:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3959:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3960:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char slink[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3961:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hlink[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readlink_buf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4067:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4068:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ntf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ntf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4218:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char snd1[sizeof(passage)] = "GARBAGE snd1"; /* < sizeof(passage) */
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char snd2[sizeof(passage)] = "GARBAGE snd2";
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char snd3[sizeof(passage)] = "GARBAGE snd3";
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcv1[sizeof(passage)] = "GARBAGE rcv1";
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4229:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcv2[sizeof(passage)] = "GARBAGE rcv2";
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rcv3[sizeof(passage)] = "GARBAGE rcv3";
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4484:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tf[NAMEBUF] = {0};
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_binary-io_std.c:42:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char write_array[BSIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_binary-io_std.c:43:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char read_array[BSIZE];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_binary-io_std.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file[1024];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_binary-io_std.c:46:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(file, "binary-io.%lu.out", (unsigned long)getpid());
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_binary-io_std.c:50:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file, "w");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_binary-io_std.c:79:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file, "r");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fcntl_std.c:42:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open("x.x", O_WRONLY | O_CREAT, 0666);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fgets_std.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[250];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fgets_std.c:34:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	in = fopen( "x_data.in", "r" );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fgets_std.c:41:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	out = fopen( "job_rsc_fgets_std.output", "w" );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fread_std.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_fread_std.c:28:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_in = fopen("x_data.in", "r"); 
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_ftell_std.c:29:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_in = fopen( "x_data.in", "r" );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_getdirentries_std.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char d_name[255];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_getdirentries_std.c:82:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("testdir/first", O_CREAT | O_TRUNC | O_RDWR, S_IRUSR | S_IWUSR);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_getdirentries_std.c:89:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("testdir/second", O_CREAT | O_TRUNC | O_RDWR, S_IRUSR | S_IWUSR);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_getdirentries_std.c:96:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("testdir/third", O_CREAT | O_TRUNC | O_RDWR, S_IRUSR | S_IWUSR);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_getdirentries_std.c:103:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("testdir", O_RDONLY);	
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_getdirentries_std.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8192];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:51:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	Buf1[1024];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:52:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	Buf2[1024] = "******************************";
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:110:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( (fd=open("hello.results",O_WRONLY|O_CREAT|O_TRUNC,0664)) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_open-N-serial_std.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[_POSIX_PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_open-N-serial_std.c:48:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	max = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_open-N-serial_std.c:51:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(filename,"temp.%d",i);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_open-N-serial_std.c:52:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(filename,"w+");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_stat_std.c:100:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( (fd=open(name,O_RDONLY)) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_true-false_std.cpp:66:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fdp = fopen( argv[1], "w+");
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_truncate_std.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input[80];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_truncate_std.c:38:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[1],O_WRONLY|O_CREAT,0700);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_truncate_std.c:46:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[1],O_RDWR|O_TRUNC,0700);
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filebuff[10000];
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filenmbuf[1024];
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newfilenmbuf[1024];
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tstmessage[20];
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char chktstmessage[20];
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:77:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(filenmbuf, "/test_chirp_io.txtdata");
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:105:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(newfilenmbuf, "/job_chirp_io2.txtdata");
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_eventlog_base.cpp:42:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int	fd = open( state_file,
data/condor-8.6.8~dfsg.1/src/condor_tests/sleep.cpp:387:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[100], *p = append(buf, "Sleeping for "); p = append_num(p, ms/1000, 1);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_complete_params.cpp:40:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen("param_perl_input","w+");
data/condor-8.6.8~dfsg.1/src/condor_tests/x_conditional_params.cpp:79:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char copy_smaps[300];
data/condor-8.6.8~dfsg.1/src/condor_tests/x_conditional_params.cpp:249:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(p, "%d", (int)v);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_conditional_params.cpp:267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[256];
data/condor-8.6.8~dfsg.1/src/condor_tests/x_dumpcore.cpp:32:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int dumpnow = atoi("0");
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:164:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	chunkK = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:185:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		request->memsize = atoi(argv[myarg]);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:190:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		request->memtimeatsize = atoi(argv[myarg]);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:395:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char timebuf[80];
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:439:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen("/proc/self/status","r");
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:445:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    	char label[32]; int size;
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:459:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen("/proc/self/smaps","r");
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:478:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:484:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( path, "/proc/%d/psinfo", jobpid );
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:485:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(path,"r");
data/condor-8.6.8~dfsg.1/src/condor_tests/x_read_joblog.cpp:74:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		jobid   = atoi(argv[3]); // optional
data/condor-8.6.8~dfsg.1/src/condor_tests/x_read_joblog.cpp:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machinedotaddr[256];
data/condor-8.6.8~dfsg.1/src/condor_tests/x_return-n.cpp:43:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		for( i = 0; i < atoi(argv[2]); i++ ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/x_return-n.cpp:51:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		arg = atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bigbuff[512];
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:70:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open((const char*)output, O_WRONLY | O_APPEND, 0777);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bigbuff[512];
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:112:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open((const char*)output, O_WRONLY | O_APPEND, 0777);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:119:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( bigbuff, "done <%f>\n", rtime);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:152:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		slowexit = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:160:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unsigned int sleeptime = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:163:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	alarm((unsigned int)atoi(argv[1]));
data/condor-8.6.8~dfsg.1/src/condor_tests/x_write_joblog_events.cpp:76:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int count = atoi(argv[3]);
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:346:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:552:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		cluster_id = atoi( arg );
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:616:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		proc_id = atoi( arg );
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:804:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				lease_time = atoi( *tmp );
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:819:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			timeout = atoi( *tmp );
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:296:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[4096];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:396:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[100];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:516:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * ocl_value(int val) { static char ach[11]; sprintf(ach, "%d", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:516:56:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
const char * ocl_value(int val) { static char ach[11]; sprintf(ach, "%d", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:517:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * ocl_value(unsigned int val) { static char ach[11]; sprintf(ach, "%u", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:517:65:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
const char * ocl_value(unsigned int val) { static char ach[11]; sprintf(ach, "%u", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:518:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * ocl_value(long long val) { static char ach[22]; sprintf(ach, "%lld", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:518:62:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
const char * ocl_value(long long val) { static char ach[22]; sprintf(ach, "%lld", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:519:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * ocl_value(unsigned long long val) { static char ach[22]; sprintf(ach, "%llu", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:519:71:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
const char * ocl_value(unsigned long long val) { static char ach[22]; sprintf(ach, "%llu", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:520:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * ocl_value(double val) { static char ach[22]; sprintf(ach, "%g", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:520:59:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
const char * ocl_value(double val) { static char ach[22]; sprintf(ach, "%g", val); return ach; }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:721:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			opt_dev = atoi(argv[++i]);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:726:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				sim_index = atoi(pcolon+1);
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:733:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				if (pcomma) { sim_device_count = atoi(pcomma+1); }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:992:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char prefix[100];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:1010:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char prefix[100];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:1149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char prefix[100];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c:34:1:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
TCHAR administrators_buf[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c:35:1:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
TCHAR everyone_buf[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c:42:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR domain_buf[BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_set_acls.c:106:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR cmd_buf[1024];  
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:113:63:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool open_log_file(void) { return ( NULL != ( LogFileHandle = fopen(LogFileName, "w") ) ); }
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:585:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFFERSIZE];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:611:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cfg_out = fopen(config_file_tmp, "w");
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:619:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cfg = fopen(Config_file, "r");
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:705:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_urlfetch.cpp:84:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *fp = fopen(argv[lastLoc], "r");
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_urlfetch.cpp:87:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[4];
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_urlfetch.cpp:179:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ptrFile = fopen(prev, "r");
data/condor-8.6.8~dfsg.1/src/condor_tools/cuda_header_doc.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:315:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(host, "host= ");
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:319:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(port, "port= ");
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			remoteUser[128];
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:326:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  	attrName[32], attrPrio[32];
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:327:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  	char  	name[128];
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:359:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    	sprintf( attrName , "Name%d", i );
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:360:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    	sprintf( attrPrio , "Priority%d", i );
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:423:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:443:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				NumMachinesWanted = atoi(*ptr);
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:526:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char remoteUser[1024];
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:544:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	remoteHost[MAXHOSTNAMELEN];
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:264:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            wide_format_width = atoi(++pcolon);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:277:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        specifiedMatch = atoi(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:287:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        maxAds = atoi(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1060:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(host, "host=");
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1064:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(port, "port=");
data/condor-8.6.8~dfsg.1/src/condor_tools/invalidate_host.cpp:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:89:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	sig = atoi( &argv[1][1] );
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:106:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = (pid_t)atoi(*tmp);
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_name[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmdline[64];
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:182:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if( ! (fp = fopen( tmp_name, "r" )) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:199:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi( proc_dir->d_name );
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[250];
data/condor-8.6.8~dfsg.1/src/condor_tools/load_history.cpp:114:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ScheddBirthdate = atoi(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_tools/load_history.cpp:541:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			  clock = atoi(value.Value());
data/condor-8.6.8~dfsg.1/src/condor_tools/peek.cpp:322:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char jobid[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:297:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	res = atoi ( cmdstring );
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char compare_conversion[20];
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:300:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(compare_conversion, "%i", res);
data/condor-8.6.8~dfsg.1/src/condor_tools/preen.cpp:512:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return atoi(ptr + strlen(pattern) );
data/condor-8.6.8~dfsg.1/src/condor_tools/probe_process.cpp:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[ BUFSIZ ];
data/condor-8.6.8~dfsg.1/src/condor_tools/qedit.cpp:261:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (pcolon) { dash_diagnostic = atoi(++pcolon); }
data/condor-8.6.8~dfsg.1/src/condor_tools/return-n.cpp:42:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sleep( atoi ( argv[2] ) );
data/condor-8.6.8~dfsg.1/src/condor_tools/return-n.cpp:45:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		arg = atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:140:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int hours=atoi(argv[i+1]);  
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:147:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int month=atoi(argv[i+1]);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:148:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int day=atoi(argv[i+2]);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:149:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int year=atoi(argv[i+3]);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:156:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int month=atoi(argv[i+1]);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:157:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int day=atoi(argv[i+2]);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:158:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int year=atoi(argv[i+3]);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Line[MaxLen+1];
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:302:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char NewStr[200];
data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pw[MAX_PASSWORD_LENGTH + 1];
data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[MAX_PASSWORD_LENGTH + 1];
data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp:526:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZE];
data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp:159:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				DataCount = atoi(*argv);
data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp:165:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				Seed = atoi(*argv);
data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp:172:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				SleepTime = atoi(*argv);
data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp:180:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				Min = atoi(*argv);
data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp:182:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				Max = atoi(*argv);
data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp:272:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return atoi(ptr + strlen(pattern) );
data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp:671:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						cmd = atoi( *tmp );
data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp:1720:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256], addr[256];
data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp:1830:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int dig = atoi( token );
data/condor-8.6.8~dfsg.1/src/condor_tools/transfer_data.cpp:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char constraint[128];
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:158:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ProcessString[20]="0", StepString[20]="0", RowString[20]="0", IteratingString[10] = "0";
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:245:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if( atoi(univ) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:246:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return atoi(univ);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:442:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int opt = atoi(pcolon+1);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:454:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
							testing.repeat_count = (pcolon) ? atoi(++pcolon) : 100;
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:469:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					DashConvertOldRoutes = atoi(++pcolon);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:741:2:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	open(file_string, FileSource);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:954:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(StepString, "%d", step);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:955:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(RowString, "%d", row);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:956:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(IteratingString, "%d", has_iterate);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:969:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void)sprintf(StepString, "%d", step);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:972:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void)sprintf(StepString, "%d", step);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:974:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		(void)sprintf(RowString, "%d", row);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:1657:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(IteratingString, "%d", 0);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:2395:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[200];
data/condor-8.6.8~dfsg.1/src/condor_tools/update_machine_ad.cpp:72:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen( file, "r" );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:272:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					id = atoi(p);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:508:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int month=atoi(argv[i+1]);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:509:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int day=atoi(argv[i+2]);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:510:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int year=atoi(argv[i+3]);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:687:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int beginTime=atoi(argv[SetBegin+2]);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:722:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int lastTime=atoi(argv[SetLast+2]);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1082:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  attrName[32], attrPrio[32], attrResUsed[32], attrWtResUsed[32], attrFactor[32], attrBeginUsage[32], attrAccUsage[42], attrRequested[32];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1083:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  attrLastUsage[32];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1086:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  name[128], policy[32];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char strI[32];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1111:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(strI, "%d", i);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1160:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char attr[32];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1388:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sz[60];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1389:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fmt[10] = "%";
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1390:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(fmt+1, "%d.%df", width, decimal);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1395:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(fmt+1,".%dg", width-6);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1469:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char UserCountStr[30];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1778:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  attrName[32], attrStartTime[32];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1779:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  name[128];
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1790:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( attrName , "Name%d", i );
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1791:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( attrStartTime , "StartTime%d", i );
data/condor-8.6.8~dfsg.1/src/condor_tools/version.cpp:101:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(fullpath, "/libcondorsyscall.a");
data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpfile[L_tmpnam];
data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp:41:7:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	char tmpfile[L_tmpnam];
data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp:42:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	tmpnam(tmpfile);
data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp:44:38:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	cmd.formatstr( "cp %s %s", argv[1], tmpfile);
data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp:47:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	ClassAdCollection c(NULL, tmpfile);
data/condor-8.6.8~dfsg.1/src/condor_tools/view_collection.cpp:57:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	unlink(tmpfile);
data/condor-8.6.8~dfsg.1/src/condor_tools/wait.cpp:135:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			waittime = atoi(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_tools/wait.cpp:145:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			minjobs = atoi( argv[i] );
data/condor-8.6.8~dfsg.1/src/condor_tools/wait.cpp:217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char key[1024];
data/condor-8.6.8~dfsg.1/src/condor_tools/wait.cpp:218:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(key,"%d.%d.%d",event->cluster,event->proc,event->subproc);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_getHostFromAddr.cpp:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expected[30];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_getHostFromAddr.cpp:60:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(expected, "192.168.0.2");
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_getHostFromAddr.cpp:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expected[30];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_getHostFromAddr.cpp:81:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(expected, "balthazar.cs.wisc.edu");
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strlwr.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strlwr.cpp:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strupr.cpp:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/FTEST_strupr.cpp:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1801:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1819:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1873:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1925:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:1943:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:3664:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	FILE* tmp = tmpfile();
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:3684:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	FILE* tmp = tmpfile();
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:3703:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	FILE* tmp = tmpfile();
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:3747:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	FILE* tmp = tmpfile();
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:3768:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	FILE* tmp = tmpfile();
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:3790:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	FILE* tmp = tmpfile();
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:3811:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	FILE* tmp = tmpfile();
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:579:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual3[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:631:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual3[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:665:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual3[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:3176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:3204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:3231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:3258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:3286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:3313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:3340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:4571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:4594:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:4617:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:4644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5740:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5766:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5792:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5818:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5844:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5924:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5950:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5951:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expect[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5985:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:5986:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expect[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:6016:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:6518:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:6545:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:7443:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:7472:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:7501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:7527:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:7553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actual[1024];
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_TmpDir.cpp:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_TmpDir.cpp:191:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cut_assert_gz( sprintf(non_existent, "DoesNotExist%c", DIR_DELIM_CHAR) );
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_TmpDir.cpp:192:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	cut_assert_gz( sprintf(non_existent_file, "DoesNotExist%cDoesNotExist", 
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/unit_tests.cpp:121:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				num_tests = atoi(argv[i+1]);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/unit_tests.cpp:130:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				num_funcs_or_objs = atoi(argv[i+1]);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char host[128];
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char job[40];
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:239:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(job, "%d.%d", js->cluster, js->proc);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash[40];
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:302:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(hash, "%d.%d", cluster, proc);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_addr[128];
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash[40];
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:394:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(hash, "%d.%d", event->cluster, event->proc);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:439:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(hash, "%d.%d", event->cluster, event->proc);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:460:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(hash, "%d.%d", event->cluster, event->proc);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:513:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(hash, "%d.%d", event->cluster, event->proc);
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:557:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(hash, "%d.%d", event->cluster, event->proc);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.cpp:116:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    log_fp = fopen(job_queue_name, "r");
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.cpp:535:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	op_type = atoi(op);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.h:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	job_queue_name[PATH_MAX];//!< job queue log file path
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogProber.cpp:217:3:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		atol(((ClassAdLogEntry *)caLogParser.getCurCALogEntry())->key);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogProber.cpp:219:3:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		atol(((ClassAdLogEntry *)caLogParser.getCurCALogEntry())->value);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogProber.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			job_queue_name[PATH_MAX]; //!< job queue file path
data/condor-8.6.8~dfsg.1/src/condor_utils/MapFile.cpp:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char spare[sizeof(void*)-1];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:269:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		pCopy = (char *) new char[s_len+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[bufLen];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[bufLen];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:360:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[bufLen];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[bufLen];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[bufLen];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[65];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:702:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pNewData + iPosInNewData, 
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:706:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pNewData + iPosInNewData, pszReplaceWith, iWithLen);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:710:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pNewData + iPosInNewData, 
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:748:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(Data + Len, buffer, s_len + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:1053:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/Regex.cpp:163:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newre, re, size);
data/condor-8.6.8~dfsg.1/src/condor_utils/access_euid.unix.cpp:74:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		back = open(".", O_RDONLY);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_fmt[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:430:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp_fmt, "%%%ds", width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:432:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp_fmt, "%%%d.%ds", width, fmt.width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:463:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ach[2] = { ch, 0 };
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:580:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ach[2] = { alt_char, 0 };
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:596:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_fmt[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:609:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp_fmt, "%%%ds", width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:611:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp_fmt, "%%%d.%ds", width, fmt.width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:701:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tfmt[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:707:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(tfmt, "%%%ds", width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:709:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(tfmt, "%%%d.%ds", width, fmt.width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:912:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char tfmt[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:918:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
									sprintf(tfmt, "%%%ds", width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:920:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
									sprintf(tfmt, "%%%d.%ds", width, fmt->width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:957:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char tfmt[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:963:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
									sprintf(tfmt, "%%%ds", width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:965:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
									sprintf(tfmt, "%%%d.%ds", width, fmt->width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1844:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char tfmt[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1850:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
									sprintf(tfmt, "%%%ds", width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1852:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
									sprintf(tfmt, "%%%d.%ds", width, fmt->width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1889:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char tfmt[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1895:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
									sprintf(tfmt, "%%%ds", width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1897:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
									sprintf(tfmt, "%%%d.%ds", width, fmt->width);
data/condor-8.6.8~dfsg.1/src/condor_utils/ckpt_util.cpp:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[65536];		/* 64K */
data/condor-8.6.8~dfsg.1/src/condor_utils/ckpt_util.cpp:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[65536];		/* 64K */
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:610:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:1054:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	line[ATTRLIST_MAX_EXPRESSION + 64];
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_oldnew.cpp:682:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[sizeof(fmt) + 12]; //+12 for time value
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_adtypes.cpp:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	str[20];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_arglist.cpp:152:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char **args_array = new char *[args_list.Number()+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_arglist.cpp:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_base64.cpp:50:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buff, bptr->data, bptr->length-1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:311:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (pb) memcpy(pb, pbInsert, cbInsert);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1077:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char magic_prefix[MAX_DISTRIBUTION_NAME + 3];	// case-insensitive
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1458:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char the_path[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1649:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char the_path[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:2759:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_crontab.cpp:765:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				cur_step = atoi( stepStr.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_crontab.cpp:794:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value = atoi( _temp->Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_crontab.cpp:802:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value = atoi( _temp->Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_crontab.cpp:841:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			int value = atoi(token.Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:656:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sz[250];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:795:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:967:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1445:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1529:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1530:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char error_type[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1865:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1908:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer [128];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1981:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1984:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(messagestr,  "Job was checkpointed");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2021:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer [128];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char reason_buf[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512], checkpointedstr[6], terminatestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2355:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(messagestr,  "Job evicted, terminated and was requeued");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2356:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(checkpointedstr, "false");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2358:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(messagestr,  "Job evicted and was checkpointed");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2359:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(checkpointedstr, "true");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2361:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(messagestr,  "Job evicted and was not checkpointed");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2362:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(checkpointedstr, "false");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2367:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(terminatestr,  " (1) Normal termination (return value %d)", return_value);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2369:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(terminatestr,  " (0) Abnormal termination (signal %d)", signal_number);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2372:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
					strcat(terminatestr, " (1) Corefile in: ");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2375:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
					strcat(terminatestr, " (0) No core file ");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2380:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(terminatestr,  " reason: ");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2576:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2583:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(messagestr,  "Job was aborted by the user");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2620:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reason_buf[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2768:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2775:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(messagestr,  "(1) Normal termination (return value %d)", returnValue);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2777:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(messagestr,  "(0) Abnormal termination (signal %d)", signalNumber);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2779:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(messagestr, " (1) Corefile in: ");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2782:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				strcat(messagestr, " (0) No core file ");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2808:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2855:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sz[250];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2856:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char srun[sizeof("Total")];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2857:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sdir[sizeof("Received")];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2858:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sjob[22];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sz[250];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3281:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3403:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3407:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(messagestr, "Job was suspended (Number of processes actually suspended: %d)", num_pids);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3477:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3481:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(messagestr, "Job was unsuspended");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3586:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reason_buf[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3628:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3634:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(messagestr, "Job was held: reason unspecified");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3761:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reason_buf[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3786:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char messagestr[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3793:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(messagestr, "Job was released: reason unspecified");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3931:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(result, "Usr %d %02d:%02d:%02d, Sys %d %02d:%02d:%02d",
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:4271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5744:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[4096], buf2[4096], buf3[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5871:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[8192];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.h:428:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char execute_host[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.h:430:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char daemon_name[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.h:485:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char info[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.h:1237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	message[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_mkstemp.cpp:34:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char encoding[65] =
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_mkstemp.cpp:61:5:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
int mkstemp(char * ptemplate)
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_mkstemp.cpp:110:11:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	int fd = mkstemp(Template);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_mkstemp.cpp:113:11:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	int fd = mkstemp(Template);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:80:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *h_aliases[1] = {NULL};
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:81:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *h_addr_list[MAXSIMULATEDADDRS];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:82:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char h_name[NI_MAXHOST];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:118:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *h_aliases[1] = {NULL};
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:119:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char h_name[NI_MAXHOST]; // from /usr/include/sys/param.h
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAXHOSTNAMELEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:160:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ip_str[MAXHOSTNAMELEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:199:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char collector_host[MAXHOSTNAMELEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_name[MAXHOSTNAMELEN]; // could get away with 16 for IPv4
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PIDENVID_ENVID_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_q.cpp:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char    		scheddString [32];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_q.h:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char owner[MAXOWNERLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_q.h:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char schedd[MAXSCHEDDLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:93:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char code[4];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:94:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(code,"%%%02x",*str);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:398:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi( getPort() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:649:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char nameBuffer[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char addressBuffer[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:652:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char protocolBuffer[16];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:653:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		int matches = sscanf( open, "[ p=%16s a=%64s port=%d; n=%64s ",
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:673:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		const char * parsed = open;
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:158:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tmp, &v4, sizeof(v4));
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:162:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tmp, &v6, sizeof(v6));
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:345:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int port_no = atoi(port_begin);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[NI_MAXHOST];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:351:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, addr_begin, addr_len);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:363:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, addr_begin, addr_len);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:408:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char copy[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:430:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char copy[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:460:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char unbracketedString[(8 * 4) + 7 + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( unbracketedString, & ip_string[1], addrLength );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:534:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char colonated[IP_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:360:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char previous_ready_message[200];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_threads.cpp:479:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char cbuf[sizeof(pthread_t)];
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:956:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						code = atoi(pn);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1127:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool MacroStreamFile::open(const char * filename, bool is_command, MACRO_SET& set, std::string &errmsg) {
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1138:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool MacroStreamCharSource::open(const char * src_string, const MACRO_SOURCE& _src)
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1160:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		src.line = atoi(line->c_str()+12);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1201:2:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	open(file_string, FileSource);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1439:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					code = atoi(pn);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2042:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ptab, set.table, sizeof(set.table[0]) * set.size);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2053:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(pmet, set.metat, sizeof(set.metat[0]) * set.size);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2460:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, str, cch*sizeof(str[0]));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2530:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, str, cch*sizeof(str[0]));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3225:38:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				if (fmt && ! strchr(buf, '.')) { strcat(buf, ".0"); } // force it to look like a real
data/condor-8.6.8~dfsg.1/src/condor_utils/copy_file.cpp:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/credential.unix.cpp:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (data, buff, buff_size);
data/condor-8.6.8~dfsg.1/src/condor_utils/credential.unix.cpp:97:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (pData, data, data_size);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:45:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE* credmon_pidfile = fopen(pid_path.c_str(), "r");
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char username[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char watchfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char watchfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char watchfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char watchfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char username[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char markfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:345:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((trg + strlen(src) - 5), ".cred");
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:348:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((trg + strlen(src) - 5), ".cc");
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:351:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy((trg + strlen(src) - 5), ".mark");
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:399:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:410:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char markfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job.cpp:578:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fname[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job.cpp:604:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[STDOUT_READBUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job.cpp:672:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[STDERR_READBUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/cronos.cpp:137:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( prev_time,now_time, sizeof(now_time) ); /* ..dhaval 9/25 */
data/condor-8.6.8~dfsg.1/src/condor_utils/d_format_time.cpp:29:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char answer[25];
data/condor-8.6.8~dfsg.1/src/condor_utils/d_format_time.cpp:47:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        (void)sprintf(answer, "%d %02d:%02d:%02d", days, hours, minutes, secs);
data/condor-8.6.8~dfsg.1/src/condor_utils/date_util.cpp:31:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char daysInMonth[13] = {	0, 31, 28, 31, 30, 31,
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tsv[100];
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tsv[100];
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:662:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			  clock = atoi(value.Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/debug_timer.cpp:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/do_connect.unix.cpp:67:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		unsigned short rc = atoi( pval );
data/condor-8.6.8~dfsg.1/src/condor_utils/do_connect.unix.cpp:98:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char answer[ 512 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/do_connect.unix.cpp:117:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat( answer, "_PORT" );
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:382:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:486:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char request[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:498:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char header[statLineSize];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[statLineSize];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:589:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char memUsageUnit[2];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:590:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netInUnit[2];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:591:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netOutUnit[2];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:661:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:750:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:875:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:1032:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:1092:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char existingImage[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:77:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char * const _condor_DebugCategoryNames[D_CATEGORY_COUNT];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:306:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char timebuf[80];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:427:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char verbosity[10] = "";
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:432:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf_error = sprintf(verbosity, ":%d", verb);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:503:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char szModule[MAX_PATH], szFileAndLine[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1086:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_buf[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_buf[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_buf[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		old[MAXPATHLEN + 4];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1439:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_buf[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_buf[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1557:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char panic_msg[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1643:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg_buf[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1706:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1707:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char header[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1708:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tail[DPRINTF_ERR_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1743:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, " euid: %d, ruid: %d", (int)geteuid(),
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:1953:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	extern const char * const _condor_DebugCategoryNames[D_CATEGORY_COUNT];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:2011:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char intbuf[50];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:2092:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mutex_name[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:2095:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(mutex_name, "Global\\");
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:2119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mutex_name[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:2186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szModule[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_common.cpp:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char * const _condor_DebugCategoryNames[D_CATEGORY_COUNT];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_common.cpp:54:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * const _condor_DebugCategoryNames[D_CATEGORY_COUNT] = {
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pname[ BUFSIZ ];
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf_config.cpp:262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pname[ BUFSIZ ];
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char slot_num[10];
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:453:8:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		if (!MultiByteToWideChar( CP_ACP, MB_ERR_INVALID_CHARS, 
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:471:7:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		if (MultiByteToWideChar( CP_ACP, MB_ERR_INVALID_CHARS, 
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:475:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		} else if (MultiByteToWideChar( CP_THREAD_ACP, MB_ERR_INVALID_CHARS, 
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:643:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t UserGroupName[255];
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:694:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t UserGroupName[255];
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:948:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buf[1024]; // this is the max size sprintf will print into anyways
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				sidBuffer[max_sid_length];
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.h:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				domainBuffer[max_domain_length];
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(FinalSubject, EMAIL_SUBJECT_PROLOG, prolog_length);
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:80:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&FinalSubject[prolog_length], subject, subject_length);
data/condor-8.6.8~dfsg.1/src/condor_utils/email_file.cpp:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char file[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/env.cpp:160:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char delim_str[2];
data/condor-8.6.8~dfsg.1/src/condor_utils/error_utils.cpp:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char error_message[1000];
data/condor-8.6.8~dfsg.1/src/condor_utils/except.cpp:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ BUFSIZ ];
data/condor-8.6.8~dfsg.1/src/condor_utils/fdpass.unix.cpp:48:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(CMSG_DATA(cmsg), &fd, sizeof(int));
data/condor-8.6.8~dfsg.1/src/condor_utils/fdpass.unix.cpp:117:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&fd, CMSG_DATA(cmsg), sizeof(int));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mutex_name[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:443:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(mutex_name, "Global\\");
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:466:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mutex_name[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:735:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hashVal[256] = {0};
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:736:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(hashVal, "%lu", hash);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:738:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(hashVal+strlen(hashVal), "%lu", hash);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ATTRLIST_MAX_EXPRESSION];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ntdomain[80];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:626:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ATTRLIST_MAX_EXPRESSION];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:692:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tempbuf[80];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:695:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tempbuf,"%x#%x%x%x",++SequenceNum,(unsigned)time(NULL),
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char daemon[16]; daemon[15] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:4355:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer_db.cpp:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ATTRLIST_MAX_EXPRESSION];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer_db.cpp:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src_host[MAXMACHNAME];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_xml.cpp:172:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(outfilename, "Events.xml");
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:75:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*port = atoi(q);
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:155:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(buf,".exe");
data/condor-8.6.8~dfsg.1/src/condor_utils/filesystem_remap.cpp:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[80];
data/condor-8.6.8~dfsg.1/src/condor_utils/filesystem_remap.cpp:334:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sig1[80],sig2[80];  // sig hashes should only be ~16 chars, so 80 is futureproof
data/condor-8.6.8~dfsg.1/src/condor_utils/filesystem_remap.cpp:591:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = fopen("/proc/self/mountinfo", "r")) == NULL) {
data/condor-8.6.8~dfsg.1/src/condor_utils/firewall.WINDOWS.cpp:363:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%S", str);
data/condor-8.6.8~dfsg.1/src/condor_utils/firewall.WINDOWS.cpp:421:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	int cch = MultiByteToWideChar(CP_ACP, 0, str, (int)strlen(str), NULL, 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/firewall.WINDOWS.cpp:428:2:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	MultiByteToWideChar(CP_ACP, 0, str, -1, (WCHAR*)the_bstr, cch+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:30:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[ 12 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:34:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(buf,"    ???    ");
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:39:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( buf, "%2d/%-2d %02d:%02d",
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:51:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[ 18 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:55:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(buf,"    ???    ");
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:60:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( buf, "%2d/%02d/%-4d %02d:%02d",
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:79:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char answer[25];
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:82:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(answer,"[?????]");
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:93:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void)sprintf( answer, "%3d+%02d:%02d:%02d", days, hours, min, secs );
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:106:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char answer[25];
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:109:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(answer,"[?????]");
data/condor-8.6.8~dfsg.1/src/condor_utils/format_time.cpp:119:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    (void)sprintf( answer, "%3d+%02d:%02d", days, hours, min );
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.cpp:239:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char sz[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.cpp:266:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                   int level = (atoi(popt) * IF_BASICPUB) & IF_PUBLEVEL;
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_buf[MAXPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAXPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char full_buf[MAXPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_buf[MAXPATHLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/getmnt.unix.cpp:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:180:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[GRAM_STATUS_STR_LEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:1452:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:1631:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:1729:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/hashkey.cpp:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:513:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.tools.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	 *m_tool_paths[11];
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:173:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char     buf[ 12 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:179:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "%2d/%-2d %02d:%02d",
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:201:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char     answer[25];
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:204:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(answer,"[?????]");
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:215:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        (void)sprintf( answer, "%3d+%02d:%02d:%02d", days, hours, min, secs );
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:263:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	curClusterId_hor = atoi(cid);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:272:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	curProcId_hor = atoi(pid);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:325:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	curClusterId_ver = atoi(cid);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:330:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	curProcId_ver = atoi(pid);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:343:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			|| curClusterId_ver != atoi(cid)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:351:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			curProcId_ver != atoi(pid)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:83:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(*host, addr, pos - addr);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:93:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(*host,addr,len);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:110:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(*port,addr,len);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:121:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(*params,addr,len);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:196:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char sinful[SINFUL_STRING_BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cn1[MAXHOSTNAMELEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:284:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[17];
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:327:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		x = atoi( &(buf[j]) );
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addrbuf[INET6_ADDRSTRLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:581:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	port = atoi(tmp);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:773:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static  char    buf[24];
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:784:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&buf[strlen(buf)], ":%d>", ntohs(port));
data/condor-8.6.8~dfsg.1/src/condor_utils/ipv6_addrinfo.cpp:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( rv->ai_addr, ai->ai_addr, rv->ai_addrlen );
data/condor-8.6.8~dfsg.1/src/condor_utils/ipv6_hostname.cpp:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hostname[MAXHOSTNAMELEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/ipv6_hostname.cpp:392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[NI_MAXHOST];
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  buffer[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:90:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buffer, "%04d%02d%02d", year, month, day);
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:92:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buffer, "%04d-%02d-%02d", year, month, day);
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:157:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char workspace[6];
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:163:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				time->tm_year = atoi(workspace);
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:168:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				time->tm_mon = atoi(workspace);
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:173:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				time->tm_mday = atoi(workspace);
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:179:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			time->tm_hour = atoi(workspace);
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:183:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			time->tm_min = atoi(workspace);
data/condor-8.6.8~dfsg.1/src/condor_utils/iso_dates.cpp:187:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			time->tm_sec = atoi(workspace);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuedatabase.h:177:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			major = atoi(this->getValue(0,0));
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuedatabase.h:178:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			minor = atoi(this->getValue(0,1));
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuedatabase.h:179:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			back_to_major = atoi(this->getValue(0,2));
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuedatabase.h:180:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			back_to_minor = atoi(this->getValue(0,3));
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuedatabase.h:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg_body[4000];
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char curClusterId[20];		//!< current Cluster Id
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.h:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char curProcId[20];			//!< current Proc Id
data/condor-8.6.8~dfsg.1/src/condor_utils/killfamily.t.cpp:36:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	daddy_pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_utils/log.cpp:204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char op[20];
data/condor-8.6.8~dfsg.1/src/condor_utils/log.cpp:205:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	int  len = sprintf(op, "%d ", op_type);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[80];
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:114:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((*namelist)[i], entry, entrysize);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char empty[BUFSIZ];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:269:2:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	MultiByteToWideChar(CP_ACP, 0, str, -1, str_unicode, strlen(str)+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:544:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wszLogin[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:545:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wszPassw[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:559:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inBuf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:590:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wszLogin[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:597:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inBuf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:618:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wszLogin[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inBuf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:693:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inBuf[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:347:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
							wid = atoi(val.c_str());
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:402:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp[40] = "%"; char *p = tmp+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:404:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						p += sprintf(p, "%d", wid);
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:405:52:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						if ( ! (opts & FormatOptionNoTruncate)) p += sprintf(p, ".%d", wid);
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:623:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char or_val[3] = {0,0,0};
data/condor-8.6.8~dfsg.1/src/condor_utils/mark_thread.cpp:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[40];
data/condor-8.6.8~dfsg.1/src/condor_utils/mark_thread.cpp:95:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf,"tid=");
data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.cpp:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cbuffer[COMPARE_BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.cpp:59:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int fd = open(filename,O_RDONLY);
data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.cpp:138:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data,&buffer[pointer],length);
data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.cpp:157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&buffer[pointer],data,length);
data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.cpp:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newbuffer,buffer,bufsize);
data/condor-8.6.8~dfsg.1/src/condor_utils/metric_units.cpp:30:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[METRIC_UNITS_BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/metric_units.cpp:31:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *suffix[METRIC_POWER_COUNT] =
data/condor-8.6.8~dfsg.1/src/condor_utils/misc_utils.cpp:38:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[BUF_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/misc_utils.cpp:126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  	static char buf[15];
data/condor-8.6.8~dfsg.1/src/condor_utils/misc_utils.cpp:136:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf,"%c%d:00",c,answer);
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:568:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char result_buf[10];
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:848:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char * argv[MAXARGS + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:1122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out,old,cbOld);
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:1128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out+ix, bufs[ii], cb);
data/condor-8.6.8~dfsg.1/src/condor_utils/my_username.cpp:32:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char username[UNLEN+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/my_username.cpp:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szAccountName[200], szDomainName[200];
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.WINDOWS.cpp:196:25:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                        sprintf ( offset, "%.2X%c",
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.cpp:128:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( p, src, size );
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.cpp:217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	tmp[4];
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.h:108:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char		 m_hw_addr[32];
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				 m_hw_addr_str[32];
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.h:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char			 	 m_netmask_str[32];
data/condor-8.6.8~dfsg.1/src/condor_utils/ntsysinfo.WINDOWS.cpp:255:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR sz[200];
data/condor-8.6.8~dfsg.1/src/condor_utils/ntsysinfo.WINDOWS.cpp:257:4:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   CopyMemory(sz, pmsg, cch*sizeof(TCHAR));
data/condor-8.6.8~dfsg.1/src/condor_utils/open_files_in_pid.cpp:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char f[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:207:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t group_name_unicode[MAX_GROUP_LENGTH+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:258:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char member[MAX_DOMAIN_LENGTH+MAX_ACCOUNT_LENGTH+2];  // domain+acct+slash+null
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:290:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t group_domain_unicode[MAX_DOMAIN_LENGTH+1];	// computer names restricted to 254 chars
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:291:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t group_name_unicode[MAX_GROUP_LENGTH+1];	// groups limited to 256 chars
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:354:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char t_name[MAX_ACCOUNT_LENGTH+1]; // account names are restricted to 20 chars, but I'm 
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:441:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char computerName[MAX_COMPUTERNAME_LENGTH+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:507:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char qualified_account[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:696:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(root_path, filename, len_to_copy);
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:706:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(root_path, filename, len_to_copy);
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:913:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char qualified_name[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				sidBuffer[SECURITY_MAX_SID_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				domainBuffer[80];
data/condor-8.6.8~dfsg.1/src/condor_utils/pgsqldatabase.cpp:246:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			num_result = atoi(num_result_str);
data/condor-8.6.8~dfsg.1/src/condor_utils/prioritysimplelist.h:81:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( priorities, list.priorities, sizeof( int ) * this->size );
data/condor-8.6.8~dfsg.1/src/condor_utils/proc.cpp:57:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	answer[25];
data/condor-8.6.8~dfsg.1/src/condor_utils/proc.cpp:66:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf( answer, "%3d+%02d:%02d:%02d", days, hours, min, secs );
data/condor-8.6.8~dfsg.1/src/condor_utils/proc_family_proxy.cpp:584:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char err_msg[MAX_PROCD_ERR_LEN + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/proc_id.cpp:47:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf,"0%d.-1",cluster);
data/condor-8.6.8~dfsg.1/src/condor_utils/proc_id.cpp:50:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf,"%d.%d",cluster,proc);
data/condor-8.6.8~dfsg.1/src/condor_utils/proc_id.cpp:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/proc_id.cpp:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[PROC_ID_STR_BUFLEN];
data/condor-8.6.8~dfsg.1/src/condor_utils/process_control.WINDOWS.cpp:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command_line[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log.cpp:1383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[bufSize];
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.h:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		bytes[8];
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.h:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			m_signature[64];	// File state signature
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			m_base_path[512];	// The log's base path
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.h:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			m_uniq_id[128];		// File's uniq identifier
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.h:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		filler [2048];
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:33:4:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   CopyMemory(pszNew, psz, cb);
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:102:4:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   CopyMemory(psz, pszNew, cchNew * NUMBYTES(pszNew[0]));
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:472:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szDomain[32]; // max domain name is actually 15
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:474:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szName[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:1261:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szCanonPath[MAX_PATH+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/rmdir.WINDOWS.cpp:1280:4:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
   MultiByteToWideChar(CP_ACP, 0, pszPath, -1, szFullPath + NUMCHARS(szPre)-1, MAX_PATH);
data/condor-8.6.8~dfsg.1/src/condor_utils/scanner.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		table_name[NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/scanner.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		remote_name[NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/scanner.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		local_name[NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/scanner.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sender_name[NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/scanner.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		also_implements[10 * NAME_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/selector.cpp:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char proc_buf[PROC_BUFSIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/selector.cpp:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char link_buf[LINK_BUFSIZE + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/selector.cpp:309:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( read_fds, save_read_fds, fd_set_size * sizeof(fd_set) );
data/condor-8.6.8~dfsg.1/src/condor_utils/selector.cpp:310:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( write_fds, save_write_fds, fd_set_size * sizeof(fd_set) );
data/condor-8.6.8~dfsg.1/src/condor_utils/selector.cpp:311:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( except_fds, save_except_fds, fd_set_size * sizeof(fd_set) );
data/condor-8.6.8~dfsg.1/src/condor_utils/sig_name.cpp:25:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
struct SigTable { int num; char name [9]; };
data/condor-8.6.8~dfsg.1/src/condor_utils/simple_arg.cpp:170:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	opt = atoi( m_opt );
data/condor-8.6.8~dfsg.1/src/condor_utils/simple_arg.cpp:187:8:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	opt = atol( m_opt );
data/condor-8.6.8~dfsg.1/src/condor_utils/simplelist.h:88:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (items, list.items, sizeof (ObjType) * maximum_size);
data/condor-8.6.8~dfsg.1/src/condor_utils/socket_proxy.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[SOCKET_PROXY_BUFSIZE];
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:265:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:267:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:277:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:279:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:290:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:292:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:303:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:305:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:316:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:318:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:330:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:332:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:343:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				((char *)parameters[0]), schedd_predicate_part.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:344:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:346:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:358:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			((char *)parameters[0]), schedd_predicate_hh.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:359:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:361:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:374:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				((char *)parameters[0]), schedd_predicate_part.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:375:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:377:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:392:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			((char *)parameters[0]), schedd_predicate_hh.Value() );
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:393:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fetch_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sqlquery.cpp:395:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(close_cursor_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[_POSIX_ARG_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/stat_access.h:45:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &m_statbuf, &statbuf, sizeof(StatStructType) );
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fixbuf[STL_STRING_UTILS_FIXBUF];
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ccfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpfilename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pw[255];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:316:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t w_fullname[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:355:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t pwbuf[MAX_PASSWORD_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:356:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t userbuf[MAX_PASSWORD_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:433:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char passw[MAX_PASSWORD_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:439:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(passw, "%S", pw_wc);
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:1157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&new_settings, &stored_settings, sizeof(struct termios));
data/condor-8.6.8~dfsg.1/src/condor_utils/string_conversion.WINDOWS.cpp:33:2:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	MultiByteToWideChar ( CP_ACP, 0, as, -1, ws, (int)n );
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char delims[2] = { delim_char, 0 };
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_glob.cpp:413:5:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				CopyMemory(pnew, pglob->gl_pathv, old_size);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:259:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*)pdi, SubmitMacroDefaults, sizeof(SubmitMacroDefaults));
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume[8];
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netuser[80];
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:460:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char name_info_buf[MAX_PATH+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:469:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(volume,"%c:",path[0]);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char my_name[255];
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:2095:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		coresize = atoi(size);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:2853:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		signo = atoi(sig);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:2934:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		buffer.formatstr( "%s=%d", ATTR_KILL_SIG_TIMEOUT, atoi(timeout) );
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:3810:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		len = atoi(tmp);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:4272:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if( atoi(univ) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:4273:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return atoi(univ);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:4937:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tmp = atoi(mach_count);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:4955:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			int tmp = atoi(mach_count);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7168:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(LiveClusterString, "%d", job_id.cluster);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7169:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(LiveProcessString, "%d", job_id.proc);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7170:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(LiveRowString, "%d", item_index);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7171:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(LiveStepString, "%d", step);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7190:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(LiveNodeString, "#pArAlLeLnOdE#");
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7192:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(LiveNodeString, "#MpInOdE#");
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7378:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sz[16*3];
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7382:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if (flags&2) { p += sprintf(p,"%d", start); }
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7384:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if (flags&4) { p += sprintf(p,"%d", end); }
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7386:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if (flags&8) { p += sprintf(p,"%d", step); }
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tokenbuf[sizeof("matching")+1] = ""; // temporary buffer to hold a potential keyword while scanning
data/condor-8.6.8~dfsg.1/src/condor_utils/subsystem_info.cpp:500:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	 buf[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:111:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR lpDeviceName[0x1000];
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:112:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR lpDrive[3] = "A:";
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:130:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				TCHAR lpSharedName[0x1000];
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:139:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy( lpDeviceName, "\\Device\\LanmanRedirector\\" );
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:163:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR lpDrive[3];
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:170:2:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	TCHAR lpDeviceName[0x1000];
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:192:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			TCHAR lpSharedName[0x1000];
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:201:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( lpDeviceName, "\\Device\\LanmanRedirector\\" );
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:364:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy ( pNewSysProcess, pSysProcess, blockSize );		
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:519:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy ( ptmp, &pSysHandleInformation->Handles[i], sizeof ( SYSTEM_HANDLE ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:103:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tmp, "%d", i);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:355:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    c1FP = fopen("c1FP.txt", "w+");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:356:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    c2FP = fopen("c2FP.txt", "w+");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:357:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    c3FP = fopen("c3FP.txt", "w+");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:372:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    c1FP = fopen("c1FP.txt", "r+");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:373:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    c2FP = fopen("c2FP.txt", "r+");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:374:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    c3FP = fopen("c3FP.txt", "r+");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		 buf[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp:544:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char						puniq[256], nuniq[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp:744:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	tbuf[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:488:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char					uniq_id[256] = "\0";
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:627:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	b1[64], b2[64], b3[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:779:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	sbuf[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:792:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	sbuf[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:1021:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int		i = atoi(s);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:1034:32:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		filesize_t		i = (filesize_t) atol(s);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:1047:24:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		time_t		i = (time_t) atol(s);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:1060:39:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		m_value.asInode = (StatStructInode) atol(s);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1076:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buf[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1331:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	tbuf[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1479:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1511:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_macro_expand.cpp:52:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int v = atoi(ys.Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/test_multi_log.cpp:117:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				verbosity = atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_multi_log.cpp:223:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(subE.submitHost, "<128.105.165.12:32779>");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_multi_log.cpp:467:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(execE.executeHost, "<128.105.666.99:12345>");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_multi_log.cpp:486:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(genE.info, "job type: transfer");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_multi_log.cpp:497:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(genE.info, "src_url: file:/dev/null");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_multi_log.cpp:508:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(genE.info, "dest_url: file:/dev/null");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_multi_log.cpp:558:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(execE.executeHost, "<128.105.777.99:12345>");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:1504:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:1825:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:2634:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:2685:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:3502:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:3503:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	i0[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:3625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:3876:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:3907:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:4098:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:4273:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	big_string[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_open_files.cpp:17:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid = atoi(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char output[11];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_subproc.cpp:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ 1024 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_uids.cpp:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_uids.cpp:61:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( filename, "/tmp/test-uids.%d", (int)pid );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:263:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:420:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:477:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_job_policy.cpp:543:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_user_mapping.cpp:56:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int v = atoi(ys.Value());
data/condor-8.6.8~dfsg.1/src/condor_utils/test_write_term.cpp:98:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				args.cluster = atoi(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_write_term.cpp:189:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( execute.executeHost, "<fake.host.for.test:1234>" );
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char state[32];
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char state[32];
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char state[32];
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:790:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p1[256], p2[256], buf[512];
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:840:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/totals.cpp:854:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/condor-8.6.8~dfsg.1/src/condor_utils/translation_utils.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name [40];
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.cpp:241:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy ( m_packet + offset, m_raw_mac, 6 );
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.h:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char			m_mac[STRING_MAC_ADDRESS_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.h:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char			m_subnet[MAX_IP_ADDRESS_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.h:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char			m_public_ip[MAX_IP_ADDRESS_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.h:128:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char	m_raw_mac[RAW_MAC_ADDRESS_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.h:131:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char	m_packet[WOL_PACKET_LENGTH];
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:461:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pw[255];
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:462:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char user[255];
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:463:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dom[255];
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:464:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t w_fullname[255];
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:478:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(pw, "%S", w_pw);			
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:757:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szAccountName[200], szDomainName[200];
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:2040:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[64];
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:2041:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buf, "uid %d", (int)my_uid );
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:2059:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char id[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096]; /* old classads needs to go away */
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:791:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char param_sub[sizeof("SYSTEM_PERIODIC_RELEASE_SUBCODE")+10];
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:794:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcpy(param_sub, policy_name); strcat(param_sub, "_SUBCODE");
data/condor-8.6.8~dfsg.1/src/condor_utils/user_job_policy.cpp:803:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcpy(param_sub, policy_name); strcat(param_sub, "_REASON");
data/condor-8.6.8~dfsg.1/src/condor_utils/user_log_header.cpp:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[1024];
data/condor-8.6.8~dfsg.1/src/condor_utils/user_log_header.cpp:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		 id[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/user_log_header.cpp:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		 name[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/userlog_to_classads.cpp:119:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char globalid[256];
data/condor-8.6.8~dfsg.1/src/condor_utils/userlog_to_classads.cpp:120:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(globalid,"localhost#%i.%i#%li",event->cluster,event->proc,long(eventTime));
data/condor-8.6.8~dfsg.1/src/condor_utils/which.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path_delim[3];
data/condor-8.6.8~dfsg.1/src/condor_utils/which.cpp:53:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( path_delim, "%c", PATH_DELIM_CHAR );
data/condor-8.6.8~dfsg.1/src/condor_utils/which.cpp:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char psNewDir[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_utils/which.cpp:91:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(psNewDir, "\\System");
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:174:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pchka, set.table, cbTable);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:180:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pchka, set.metat, cbMeta);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:209:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		if (cbTable > 0) memcpy(set.table, pchka, cbTable);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:216:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		if (cbMeta > 0) memcpy(set.metat, pchka, cbMeta);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((void*)pdi, XFormMacroDefaults, sizeof(XFormMacroDefaults));
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:400:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(LiveProcessString, "%d", proc);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:401:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(LiveStepString, "%d", step);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:406:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(LiveRowString, "%d", row);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:496:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if( atoi(univ) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:497:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return atoi(univ);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:699:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int MacroStreamXFormSource::open(StringList & lines, const MACRO_SOURCE & FileSource)
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:727:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	MacroStreamCharSource::open(file_string, FileSource);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:778:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return open(lines, FileSource);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:1625:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	(void)sprintf(IteratingString, "%d", 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:2156:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		xform.open(statements, ArgumentMacro);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.h:89:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int open(StringList & statements, const MACRO_SOURCE & source);
data/condor-8.6.8~dfsg.1/src/condor_utils/zkm_base64.cpp:138:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*output, &tvec.front(), *output_length);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/myvmrun_t.cpp:91:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *urls[200];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/myvmrun_t.cpp:354:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		_port = atoi(port);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/pbuffer.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readahead_buffer[P_BUFFER_READAHEAD_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp.cpp:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[FORWARD_BUFFER_SIZE];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp:529:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_main.cpp:260:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	vmgahp_mode = atoi(argv[2]);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char descbuffer[VMWARE_MONOLITHICSPARSE_VMDK_DESCRIPTOR_SIZE + 1];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:157:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(namestartpos, final_parentfilename.Value(), final_parentfilename.Length());
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:162:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(namestartpos, final_parentfilename.Value(), final_parentfilename.Length());
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[2048];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:322:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[2048];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:474:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[2048];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:601:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[2048];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:763:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[2048];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/xen_type.linux.cpp:1318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/xen_type.linux.cpp:1335:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	timestamp = (time_t)atoi(tmp_str.Value());
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:337:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char outstr[10];
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:351:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(outstr, "%u_?", slotid);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:354:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(outstr, "%u", slotid);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:364:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char outstr[16];
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:367:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(outstr, "%u", App.job_to_pid[jobid]);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:550:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pid_t pid = atoi(table[cmd_key][index].c_str());
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:876:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				bool match = (atoi(pidstr) == pid);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:909:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pid_t pid2 = atoi(itPID->second[ix].c_str());
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:977:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char outstr[MAX_PATH];
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1048:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				if (pcolon) App.diagnostic = atoi(++pcolon);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1060:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				if (pcolon) App.query_ready_timeout = atoi(++pcolon);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1212:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				App.test_backward = pcolon ? atoi(pcolon) : 1;
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1282:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pid_t pid = atoi(table["PID"][index].c_str());
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1779:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:2089:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
							pid_t pid = atoi(possible_job_pid.c_str());
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:2098:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					pid_t pid = atoi(possible_job_pid.c_str());
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:2110:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				pid_t pid = atoi(possible_job_pid.c_str());
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:2125:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				pid_t pid = atoi(exited_pid.c_str());
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:2470:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			pid_t pid = atoi(pli->pid.c_str());
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:301:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*output = atoi(input);
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:488:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int jobnum = atoi( jobnum_str );
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:766:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ( jobnum && ( atoi( jobnum ) + 4 != arg_cnt ) ) {
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:864:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ( jobnum && ( atoi( jobnum ) + 4 != arg_cnt ) ) {
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:963:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ( jobnum && ( atoi( jobnum ) + 4 != arg_cnt ) ) {
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1060:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ( jobnum && ( atoi( jobnum ) + 4 != arg_cnt ) ) {
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1091:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int jobnum = atoi( jobnum_str );
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1146:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ( jobnum && ( atoi( jobnum ) + 4 != arg_cnt ) ) {
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1177:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int jobnum = atoi( jobnum_str );
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[100];
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1281:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "%d", lease_expiry );
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1303:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ( jobnum && ( atoi( jobnum ) + 4 != arg_cnt ) ) {
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1415:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[100];
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1417:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%d", cnt);
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1501:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ( jobnum && ( atoi( jobnum ) + 4 != arg_cnt ) ) {
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1532:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int jobnum = atoi( jobnum_str );
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1634:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10000];
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1636:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%d", cnt);  
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:2373:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tmplog = fopen("/tmp/cream.log", "a");
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:2381:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		worker_cnt = atoi( worker_env );
data/condor-8.6.8~dfsg.1/src/defrag/defrag.cpp:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char const *desired_attrs[6];
data/condor-8.6.8~dfsg.1/src/deployment_tools/uniq_pid_tool_main.cpp:153:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			precision_range = new int( atoi(argv[1]) );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/PipeBuffer.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readBuffer[ PIPE_BUFFER_READAHEAD_SIZE ];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:91:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char percentEncode[4];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:439:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( ptr, "%02x", messageDigest[i] );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:578:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char messageDigest[EVP_MAX_MD_SIZE];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:674:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char messageDigest2[EVP_MAX_MD_SIZE];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:877:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char messageDigest[EVP_MAX_MD_SIZE];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:988:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errorBuffer[CURL_ERROR_SIZE];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:74:4:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			atoi(amazon_proxy_host.substr(pos + 1,
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:352:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*s = atoi(blah);
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:358:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*s=(unsigned long)atol(blah);
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:402:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *tmp_result[index_count + 1];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:422:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *tmp_result[3];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp:200:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				min_workers = atoi(my_optarg);
data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp:207:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				max_workers = atoi(my_optarg);
data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp:403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command[131072];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp:455:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char *commands[num_commands];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp:945:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char requestMap[ requestPoolSize ];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/io_loop_pthread.cpp:946:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char requests[ requestPoolSize * sizeof( Request ) ];
data/condor-8.6.8~dfsg.1/src/ec2_gahp/queryAPI-sim.cpp:845:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024+1];
data/condor-8.6.8~dfsg.1/src/gangliad/ganglia_interaction.cpp:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/condor-8.6.8~dfsg.1/src/gangliad/ganglia_interaction.cpp:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/condor-8.6.8~dfsg.1/src/gangliad/ganglia_interaction.cpp:395:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/condor-8.6.8~dfsg.1/src/gangliad/gangliad.cpp:241:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/condor-8.6.8~dfsg.1/src/gangliad/gangliad.cpp:246:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if (atoi(colon + 1) > 0) {
data/condor-8.6.8~dfsg.1/src/gce_gahp/PipeBuffer.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readahead_buffer[PIPE_BUFFER_READAHEAD_SIZE];
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:294:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			my_expires_in = atoi( value.c_str() );
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:375:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				expires_in = atoi(value.c_str());
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:498:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errorBuffer[CURL_ERROR_SIZE];
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:1274:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buff[16];
data/condor-8.6.8~dfsg.1/src/gce_gahp/gceCommands.cpp:1275:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( buff, "%d", (int)(results.size() / 4) );
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:74:4:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			atoi(gce_proxy_host.substr(pos + 1,
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:352:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*s = atoi(blah);
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:358:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*s=(unsigned long)atol(blah);
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:402:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *tmp_result[index_count + 1];
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:423:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *tmp_result[3];
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:437:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *tmp_result[1];
data/condor-8.6.8~dfsg.1/src/gce_gahp/io_loop_pthread.cpp:160:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				min_workers = atoi(my_optarg);
data/condor-8.6.8~dfsg.1/src/gce_gahp/io_loop_pthread.cpp:167:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				max_workers = atoi(my_optarg);
data/condor-8.6.8~dfsg.1/src/gce_gahp/io_loop_pthread.cpp:413:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				const char *commands[num_commands];
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:291:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10000];
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:369:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*output = atoi(input);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1529:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf_value[4096];
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:237:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(scheme, "https");
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:391:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(r->line_buffer + r->line_buffer_used,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:397:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(r->line_buffer + r->line_buffer_used,
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:1018:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(scheme, "https");
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:470:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*output = atoi(input);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:906:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:931:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:932:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char job_id[128];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1007:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1084:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1142:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy( buffer, (void *)(user_arg->buff + offset), length );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1281:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num_files = atoi( input_line[4] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1359:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			user_arg->fd = open( filename, O_RDONLY );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1362:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			user_arg->fd = open( "/dev/null", O_RDONLY );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1516:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num_files = atoi( input_line[4] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1557:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num_files = atoi( input_line[4] );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1585:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1597:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		user_arg->fd = open( dst_file, O_CREAT|O_WRONLY|O_TRUNC, 0644 );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1770:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1830:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy( buffer, (void*)(user_arg->buff + offset), length );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1863:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char user_cpu[64];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1864:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sys_cpu[64];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1865:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char wallclock[64];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2014:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[1024];
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2280:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		user_arg->fd = open( user_arg->cmd[2] + 7, O_RDONLY );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2307:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		user_arg->fd = open( user_arg->cmd[3] + 7, O_CREAT|O_WRONLY|O_TRUNC, 0644 );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2807:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf_value[4096];
data/condor-8.6.8~dfsg.1/src/pandad/PipeBuffer.h:34:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char			readAheadBuffer[readAheadSize];
data/condor-8.6.8~dfsg.1/src/pandad/TimeSensitiveQueue.cpp:21:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gracePeriod = atoi( argv[1] );
data/condor-8.6.8~dfsg.1/src/pandad/main.cpp:289:24:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			time_t submitTime = atol( argv[index + 1].c_str() );
data/condor-8.6.8~dfsg.1/src/pandad/main.cpp:533:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char curlErrorBuffer[CURL_ERROR_SIZE];
data/condor-8.6.8~dfsg.1/src/pandad/pandadClassAdLogPlugin.cpp:77:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		pandad = fopen( DEVNULL, "w" );
data/condor-8.6.8~dfsg.1/src/python-bindings/schedd.cpp:1066:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[4096];
data/condor-8.6.8~dfsg.1/src/safefile/safe_fopen.c:415:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(to, ccsStr, ccsStrLen);
data/condor-8.6.8~dfsg.1/src/safefile/safe_fopen.c:421:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(to, unicodeStr, unicodeStrLen);
data/condor-8.6.8~dfsg.1/src/safefile/safe_fopen.c:429:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(to, utf8Str, utf8StrLen);
data/condor-8.6.8~dfsg.1/src/safefile/safe_fopen.c:438:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(to, utf16Str, utf16StrLen);
data/condor-8.6.8~dfsg.1/src/safefile/safe_id_range_list.c:133:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_list, list->list, list->count * sizeof(new_list[0]));
data/condor-8.6.8~dfsg.1/src/safefile/safe_id_range_list.c:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char small_buf[16];	/* should be big enough to hold most names */
data/condor-8.6.8~dfsg.1/src/safefile/safe_id_range_list.c:448:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(id_name, id_begin, id_len);
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:220:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    saved_dir = open(".", O_RDONLY);
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:260:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	parent_dir_fd = open("..", O_RDONLY);
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:346:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[PATH_MAX] = ".";
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:655:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    saved_dir = open(".", O_RDONLY);
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:1182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		path[PATH_MAX];
data/condor-8.6.8~dfsg.1/src/safefile/safe_open.c:125:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = open(fn, flags);
data/condor-8.6.8~dfsg.1/src/safefile/safe_open.c:285:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = open(fn, flags | O_CREAT | O_EXCL, mode);
data/condor-8.6.8~dfsg.1/src/safefile/safe_open.c:442:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = open(fn, flags);
data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.cpp:185:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			for( unsigned i = 0; i < strlen( myHost ); ++i ) {
data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.cpp:481:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	std::string rewrittenAddress = exprString.substr( strlen( ATTR_MY_ADDRESS ) + 5 );
data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.cpp:1199:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(m_peer_ip,peer_ip,IP_STRING_BUF_SIZE);
data/condor-8.6.8~dfsg.1/src/ccb/ccb_server.cpp:1288:7:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		if( sscanf(buf,"%127s %127s %127s",ip,ccbid_str,cookie_str)!=3 ||
data/condor-8.6.8~dfsg.1/src/classad/classad/value.h:478:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( s, strValue->c_str( ), len );
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:334:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	for( ch=getc( fp ); ch != EOF && ch != '\n'; ch=getc( fp ) ) {
data/condor-8.6.8~dfsg.1/src/classad/collection.cpp:334:50:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	for( ch=getc( fp ); ch != EOF && ch != '\n'; ch=getc( fp ) ) {
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:199:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    while ((l=read(fd_check,k,1))>0){
data/condor-8.6.8~dfsg.1/src/classad/collectionBase.cpp:1839:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((l=read(local_sfiled,OneCharactor,1))>0){
data/condor-8.6.8~dfsg.1/src/classad/fnCall.cpp:2955:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        status = pcre_exec(re, NULL, target, (int)strlen(target),
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:69:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((l=read(filed,k,1))>0){
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:139:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((l=read(filed,k,1))>0){
data/condor-8.6.8~dfsg.1/src/classad/indexfile.cpp:212:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((l=read(filed,k,1))>0){
data/condor-8.6.8~dfsg.1/src/classad/lexerSource.cpp:57:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		character = fgetc(_file);
data/condor-8.6.8~dfsg.1/src/classad/sink.cpp:439:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int  length    = strlen(opstring);
data/condor-8.6.8~dfsg.1/src/classad/view.cpp:929:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	Value	rankValue, oldAdRank, equal;
data/condor-8.6.8~dfsg.1/src/classad/view.cpp:951:63:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		Operation::Operate( Operation::IS_OP, rankValue, oldAdRank, equal );
data/condor-8.6.8~dfsg.1/src/classad/view.cpp:952:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		if( !equal.IsBooleanValue( sameRank ) || !sameRank ) {
data/condor-8.6.8~dfsg.1/src/classad/xmlLexer.cpp:304:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(complete_tag);
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:524:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( cond, cond_s.c_str( ), 1023 );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:538:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( value, value_s.c_str( ), 63 );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:543:5:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
				sprintf( suggest, " " );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:547:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strlen( cond ) < 46 ) {
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:658:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( attr, attrExplain->attribute.c_str( ), 64 );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:697:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( suggest, suggest_s.c_str( ), 64 ); 
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:813:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( cond, cond_s.c_str( ), 1024 );
data/condor-8.6.8~dfsg.1/src/classad_analysis/analysis.cpp:821:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( value, value_s.c_str( ), 64 );
data/condor-8.6.8~dfsg.1/src/classad_analysis/start_analyzer.cpp:82:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int nread = read(fd, resultString, size);
data/condor-8.6.8~dfsg.1/src/classad_support/testcoll.cpp:360:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int cmd = 0, len = strlen( cmdStr );
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:132:2:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	lstrcpyn(icon.nid.szTip, icon.strTooltip, _countof(icon.nid.szTip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:339:3:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		lstrcpyn(vecIconsForEachCpu[0].strTooltip, TEXT("Birdwatcher: Condor is off"), _countof(vecIconsForEachCpu[0].strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:394:5:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				lstrcpyn(icon.strTooltip, TEXT("Birdwatcher: This cpu is idle"), _countof(icon.strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:400:5:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				lstrcpyn(icon.strTooltip, TEXT("Birdwatcher: This cpu is running a Condor job"), _countof(icon.strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:406:5:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				lstrcpyn(icon.strTooltip, TEXT("Birdwatcher: The job on this cpu is suspended"), _countof(icon.strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:412:5:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				lstrcpyn(icon.strTooltip, TEXT("Birdwatcher: The job on this cpu is preempting"), _countof(icon.strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:418:5:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				lstrcpyn(icon.strTooltip, TEXT("Birdwatcher: This cpu is claimed for a Condor job"), _countof(icon.strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:445:4:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			lstrcpyn(vecIconsForEachCpu[0].strTooltip, TEXT("Birdwatcher: Condor is idle"), _countof(vecIconsForEachCpu[0].strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:451:4:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			lstrcpyn(vecIconsForEachCpu[0].strTooltip,  TEXT("Birdwatcher: claimed for a Condor job..."), _countof(vecIconsForEachCpu[0].strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_birdwatcher/SystrayManager.cpp:457:4:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			lstrcpyn(vecIconsForEachCpu[0].strTooltip, TEXT("Birdwatcher: running a Condor job"), _countof(vecIconsForEachCpu[0].strTooltip));
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/cgahp_common.cpp:34:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len=strlen(raw);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/gahp.cpp:65:12:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			int c = getchar();
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/gahp.cpp:76:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		read (io[0], buff, 7);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp:78:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int bytes = read(0, buf, FORWARD_BUFFER_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp:599:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i=0; i<strlen(s); i++) {
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp:612:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (s != NULL) && (strlen(s) > 0);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp:618:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (s != NULL) && (strlen(s) > 0);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp:623:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (s != NULL) && (strlen(s) > 0);
data/condor-8.6.8~dfsg.1/src/condor_c-gahp/io_loop.cpp:647:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i=0; i<strlen (s); i++) {
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:185:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(host,url,str-url);
data/condor-8.6.8~dfsg.1/src/condor_chirp/chirp_client.c:1114:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				c += strlen(c);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:44:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		syscall( SYS_write, 2, text, strlen(text) );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:61:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	vsprintf( &text[strlen(text)], format, args );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:73:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	vsprintf( &text[strlen(text)], format, args );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:129:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	vsprintf( &text[strlen(text)], format, args );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:205:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(buffer," ");
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_error.cpp:219:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(buffer," ");
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file.h:67:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual int read( off_t offset, char *data, int length )=0;
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:51:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *junk = (char *)malloc(strlen(url_in)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:52:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *sub_url = (char *)malloc(strlen(url_in)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:110:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	local_url = (char *)malloc(strlen(local_filename) + 7);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:134:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			chunk = original->read(pos,buffer,TRANSFER_BLOCK_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:165:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			chunk = local_copy->read(pos,buffer,TRANSFER_BLOCK_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:191:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int CondorFileAgent::read( off_t offset, char *data, int length )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.cpp:194:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return local_copy->read( offset, data, length );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_agent.h:45:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual int read( off_t offset, char *data, int length );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.cpp:39:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *junk = (char *)malloc(strlen(u)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.cpp:40:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *sub_url = (char *)malloc(strlen(u)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.cpp:64:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int CondorFileAppend::read( off_t offset, char *data, int length )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.cpp:66:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return original->read(offset,data,length);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_append.h:39:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual int read( off_t offset, char *data, int length );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_basic.cpp:44:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *junk = (char *)malloc(strlen(url_in)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_basic.cpp:45:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *path = (char *)malloc(strlen(url_in)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:204:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *junk = (char *)malloc(strlen(url_in)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:205:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *sub_url = (char *)malloc(strlen(url_in)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:230:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *path = (char *)malloc(strlen(sub_url)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:276:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int CondorFileBuffer::read(off_t offset, char *data, int length)
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.cpp:341:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		piece = original->read(offset,c->data,c->size);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_buffer.h:48:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual int read(off_t offset, char *data, int length);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:49:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *junk = (char *)malloc(strlen(url_in)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:50:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *sub_url = (char *)malloc(strlen(url_in)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:93:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int CondorFileCompress::read( off_t offset, char *data, int length )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:199:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			result = original->read( poffset, buffer, COMPRESS_BUFFER_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:232:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int result = original->read(poffset,(char*)&header,sizeof(header));
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:289:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		original->read( poffset++, (char*)&b, 1 );		
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.cpp:304:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rval = original->read( poffset++, &ch, 1 );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_compress.h:47:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual int read(off_t offset, char *data, int length);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_local.cpp:43:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int CondorFileLocal::read(off_t pos, char *data, int length) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_local.cpp:48:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	result = ::read(fd,data,length);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_local.h:39:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual int read(off_t offset, char *data, int length);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_remote.cpp:50:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int CondorFileRemote::read(off_t pos, char *data, int length) 
data/condor-8.6.8~dfsg.1/src/condor_ckpt/condor_file_remote.h:39:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual int read(off_t offset, char *data, int length);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:394:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*url = (char *)malloc(strlen(logical_name)+7);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:416:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				*url = (char *)malloc(strlen(logical_name)+8);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:437:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *method = (char *)malloc(strlen(url)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:438:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *rest = (char *)malloc(strlen(url)+1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:551:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *new_url = (char *)malloc(strlen(path)+15);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:661:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                *full_path = (char *)malloc(strlen(working_dir)+strlen(short_path)+2);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:661:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                *full_path = (char *)malloc(strlen(working_dir)+strlen(short_path)+2);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:663:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(*full_path,"/");
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:829:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t CondorFileTable::read( int fd, void *data, size_t nbyte )
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:849:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int actual = f->read( fp->offset, (char*) data, nbyte );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:1073:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		nmem = (char *)realloc(working_dir,strlen(path)+strlen(working_dir)+2);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:1073:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		nmem = (char *)realloc(working_dir,strlen(path)+strlen(working_dir)+2);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.cpp:1087:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat( working_dir, "/" );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/file_state.h:167:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t	read( int fd, void *data, size_t length );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:135:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		this_read = read(fd, buf, size - bytes_read);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:489:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy( m_iwd, iwd, _POSIX_PATH_MAX - 1 );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:518:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	file_name = new char [ strlen(ckpt_name) + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_ckpt/image.cpp:896:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy( wd, m_iwd, _POSIX_PATH_MAX );
data/condor-8.6.8~dfsg.1/src/condor_ckpt/malloc.c:544:40:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
#define public_mEMALIGn  MALLOC_SYMBOL(memalign)
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:66:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(wspc) >= PATH_MAX) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:107:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	num_read = read(fd, ptr, MAX_TAB_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:111:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		num_read = read(fd, ptr += num_read, MAX_TAB_SIZE - total_read);
data/condor-8.6.8~dfsg.1/src/condor_ckpt/maps.c:197:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(st->segs[i].path) == 6) 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:141:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(ptr->owner_name, owner_name, MAX_NAME_LENGTH);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileindex2.cpp:194:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(ptr->file_name, file_name, MAX_CONDOR_FILENAME_LENGTH);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:105:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(n->data.machine_IP_name, temp_name, MAX_MACHINE_NAME_LENGTH);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:106:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(n->data.owner_name, owner_name, MAX_NAME_LENGTH);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:107:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(n->data.file_name, file_name, MAX_CONDOR_FILENAME_LENGTH);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:210:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(buffer[buf_count].file_name, ptr->data.file_name, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:212:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(buffer[buf_count].owner_name, ptr->data.owner_name,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/fileinfo2.cpp:214:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(buffer[buf_count].machine_IP_name, ptr->data.machine_IP_name,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/imds2.cpp:93:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(old_file_ptr->data.file_name, new_file_name, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/protocol.cpp:44:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        nread = read(fd, ptr, nleft);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/replication.cpp:42:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_owner_name = new char[strlen(o)+1];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/replication.cpp:49:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	_file = new char[strlen(f)+1];
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:100:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t ret = read(fd, buf, count);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:923:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(service_reply.capacity_free_ACD, "0");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:935:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(service_req.owner_name) == 0) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:936:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(service_req.file_name) == 0) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:937:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(service_req.new_file_name) == 0)) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:970:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(service_req.owner_name) == 0) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:971:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(service_req.file_name) == 0) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:972:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(service_req.new_file_name) == 0)) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1005:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(service_req.owner_name) == 0) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1006:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(service_req.file_name) == 0))
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1026:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(service_req.owner_name) == 0) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1027:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(service_req.file_name) == 0))
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1213:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				bytes_read = read(server_sd, ((char *) &reply)+bytes_recvd,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1257:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				bytes_read = read(fd, &buf, sizeof(buf));
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1315:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				bytes_read = read(server_sd, ((char *) &s_rep)+bytes_recvd,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1407:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(store_req.filename) == 0) || (strlen(store_req.owner) == 0)) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1407:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(store_req.filename) == 0) || (strlen(store_req.owner) == 0)) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1574:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(store_req.filename);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1725:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(restore_req.filename) == 0) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:1726:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(restore_req.owner) == 0)) {
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2272:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(real_path) < strlen(real_ckpt_server_dir)) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2272:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(real_path) < strlen(real_ckpt_server_dir)) || 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2276:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(real_ckpt_server_dir)) != MATCH ||
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2279:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((strlen(real_path) > strlen(real_ckpt_server_dir)) && 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2279:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		((strlen(real_path) > strlen(real_ckpt_server_dir)) && 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2280:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			path[strlen(real_ckpt_server_dir)] != '/'))
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server2.cpp:2347:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(base, "cluster", strlen("cluster")) == MATCH)
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:58:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	start = strlen(pathname) - 1;
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:63:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(filename, (pathname+start), MAX_CONDOR_FILENAME_LENGTH - 1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:329:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(req.owner, owner, MAX_NAME_LENGTH-1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:331:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int space_left = MAX_NAME_LENGTH-strlen(req.owner)-1;
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:333:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat(req.owner, "@");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:335:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
			strncat(req.owner, schedd, space_left);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:347:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytes_read = read(server_sd, ((char*) &reply)+bytes_recvd, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:400:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(req.owner, owner, MAX_NAME_LENGTH-1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:402:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int space_left = MAX_NAME_LENGTH-strlen(req.owner)-1;
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:404:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat(req.owner, "@");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:406:4:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
			strncat(req.owner, schedd, space_left);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:419:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytes_read = read(server_sd, ((char*) &reply)+bytes_recvd, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:473:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(req.owner_name, owner, MAX_NAME_LENGTH-1);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:475:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int space_left = MAX_NAME_LENGTH-strlen(req.owner_name)-1;
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:477:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
				strcat(req.owner_name, "@");
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:479:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
				strncat(req.owner_name, schedd, space_left);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:495:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytes_read = read(server_sd, ((char*) &reply)+bytes_recvd, 
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/server_interface.cpp:520:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(cap_free, reply.capacity_free_ACD,
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xferstat2.cpp:284:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(t->filename, filename, MAX_CONDOR_FILENAME_LENGTH);
data/condor-8.6.8~dfsg.1/src/condor_ckpt_server/xferstat2.cpp:285:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(t->owner, owner, MAX_NAME_LENGTH);
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:830:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(Name,"/");
data/condor-8.6.8~dfsg.1/src/condor_collector.V6/view_server.cpp:901:68:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	if ( !cad->LookupString(ATTR_STATE,StateDesc,sizeof(StateDesc)) ) strcpy(StateDesc,"");
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_stream.c:100:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    switch (SSL_get_error(stream_impl->ssl, read))
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_stream.c:103:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        len = read;
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_stream.c:136:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    switch (SSL_get_error(stream_impl->ssl, read))
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/common/axis2_ssl_stream.c:139:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        len = read;
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/HistoryProcessingUtils.cpp:131:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                !strncmp ( file + ( strlen ( file ) - 4 ), HISTORY_INDEX_SUFFIX, 4 ) ) continue;
data/condor-8.6.8~dfsg.1/src/condor_contrib/aviary/src/query/HistoryProcessingUtils.cpp:178:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strncmp ( file + ( strlen ( file ) - 4 ), HISTORY_INDEX_SUFFIX, 4 ) ) continue;
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:194:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        unsigned len = full_write(fd, str, strlen(str));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:195:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ASSERT(len == strlen(str));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:358:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        unsigned int len = full_write(fd, str, strlen(str));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:359:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ASSERT(len == strlen(str));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:671:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (match && strlen(match) == 4) {
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:675:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                	    if (tmp && strlen(tmp) == 3) {
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_hdfs/hadoop.cpp:810:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(s1) < 1)
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/getPort.cpp:38:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			path = (char*)malloc(strlen(logPath) + 10);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/getPort.cpp:71:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  port[strlen(port)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon.cpp:154:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  	proc = (char*)malloc(strlen(execDir) + 15);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon/pigeon.cpp:313:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(s1) < 1)
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/daemonReader.cpp:64:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    char *ports = strncpy(port,start+8,len);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/modTrial.cpp:110:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if(pRFile.read((char*)stateBuf.buf,stateBuf.size)){
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener.cpp:42:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer[strlen(buffer)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_listener_skype.cpp:52:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer[strlen(buffer)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:63:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer[strlen(buffer)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_pigeon/src/condor_pigeon_client/topic_publisher.cpp:461:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if( ifile.read(log,getSize)){
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:144:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cid_len = strlen(cid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:148:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cid_len = strlen(cid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:149:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pid_len = strlen(pid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:198:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(cid) + strlen(pid) + 2;
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:198:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(cid) + strlen(pid) + 2;
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:324:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cid_len = strlen(cid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:328:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cid_len = strlen(cid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:329:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pid_len = strlen(pid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:384:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int 			str_len = strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:554:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = 1024 + strlen(name) + strlen(scheddname) +
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:554:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = 1024 + strlen(name) + strlen(scheddname) +
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:555:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					newvalue.Length() + strlen(cid) + strlen(pid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:555:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					newvalue.Length() + strlen(cid) + strlen(pid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:623:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = 1024 + strlen(name) + strlen(scheddname) +
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:623:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = 1024 + strlen(name) + strlen(scheddname) +
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.cpp:624:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					newvalue.Length() + strlen(cid);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.h:51:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cid = (char*)malloc(strlen(c_id) + 1);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.h:54:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pid = (char*)malloc(strlen(p_id) + 1);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuecollection.h:65:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cid = (char*)malloc(strlen(c_id) + 1);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:852:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	key_len = strlen(key);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1365:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(dest, "'");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1386:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = 2048 + strlen(scheddname) + sizeof(lcmd->value);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/jobqueuedbmanager.cpp:1397:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = 50+strlen(scheddname);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:107:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(sqlLogList[numLogs], tmp, CONDOR_TT_MAXLOGPATHLEN-5);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:509:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buflength = strlen(buf);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:535:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(optype, "");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:536:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			strcpy(eventtype, "");
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:537:4:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			sscanf(buf, "%7s %49s", optype, eventtype);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:783:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(xmlLogList[numXLogs], tmp, CONDOR_TT_MAXLOGPATHLEN);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:886:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1345:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1632:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:1923:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2203:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2328:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2414:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2503:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2602:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2700:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2708:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(globaljobid, attVal, 100);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2710:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(src_name, attVal, _POSIX_PATH_MAX);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2712:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(src_host, attVal, 50);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2716:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(src_path, attVal, _POSIX_PATH_MAX);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2718:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(dst_name, attVal, _POSIX_PATH_MAX);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2720:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(dst_host, attVal, 50);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2724:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(dst_path, attVal, _POSIX_PATH_MAX);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2726:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(dst_daemon, attVal, 15);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2728:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(f_ts, attVal, 30);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2736:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(is_encrypted, attVal, 6);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2765:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(path, src_path, _POSIX_PATH_MAX);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2766:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, src_name, _POSIX_PATH_MAX);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2768:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(path, dst_path, _POSIX_PATH_MAX);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2769:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, dst_name, _POSIX_PATH_MAX);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2838:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:2893:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				attName = (char *)malloc(strlen(iter));
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3038:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(src, buffer, 2048);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3057:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rv = read(src, buffer, 2048);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3106:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(fd, data, 4096);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3110:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rv = read(fd, data, 4096);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3143:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rv = read(src, buffer, 4096);
data/condor-8.6.8~dfsg.1/src/condor_contrib/condor_tt/ttmanager.cpp:3154:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rv = read(src, buffer, 4096);
data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/HistoryProcessingUtils.cpp:137:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                !strncmp ( file + ( strlen ( file ) - 4 ), HISTORY_INDEX_SUFFIX, 4 ) ) continue;
data/condor-8.6.8~dfsg.1/src/condor_contrib/mgmt/qmf/daemons/HistoryProcessingUtils.cpp:184:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strncmp ( file + ( strlen ( file ) - 4 ), HISTORY_INDEX_SUFFIX, 4 ) ) continue;
data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/ODSHistoryProcessors.cpp:73:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                !strncmp ( file + ( strlen ( file ) - 4 ), HISTORY_INDEX_SUFFIX, 4 ) ) continue;
data/condor-8.6.8~dfsg.1/src/condor_contrib/plumage/src/plumage_history_load_main.cpp:270:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    history_base_length = strlen(history_base);
data/condor-8.6.8~dfsg.1/src/condor_contrib/triggerd/src/Triggerd.cpp:1000:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pos = strlen(result) - 1;
data/condor-8.6.8~dfsg.1/src/condor_contrib/utils/broker_utils.cpp:32:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(password, "");
data/condor-8.6.8~dfsg.1/src/condor_contrib/utils/broker_utils.cpp:43:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(password, "");
data/condor-8.6.8~dfsg.1/src/condor_contrib/utils/broker_utils.cpp:52:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(password, "");
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/daemon.cpp:2091:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(_alias);
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager_lease.cpp:232:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf.m_fields.m_lease_id,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_lease_manager_lease.cpp:237:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf.m_fields.m_lease_ad,
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1354:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(constraint) + strlen(ATTR_ACTION_CONSTRAINT) + 4;  
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1354:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(constraint) + strlen(ATTR_ACTION_CONSTRAINT) + 4;  
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1376:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size = strlen(action_ids) + strlen(ATTR_ACTION_IDS) + 7;
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1376:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size = strlen(action_ids) + strlen(ATTR_ACTION_IDS) + 7;
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1393:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(reason_attr) + strlen(reason) + 7;
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_schedd.cpp:1393:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(reason_attr) + strlen(reason) + 7;
data/condor-8.6.8~dfsg.1/src/condor_daemon_client/dc_startd.cpp:55:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( ids && (strlen(ids) > 0)) {
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:2450:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return rpe->read(buffer, len);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:2452:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return read((*pipeHandleTable)[index], buffer, len);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:3438:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while( read(async_pipe[0],asyncpipe_buf,8) > 0 ) { }
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:6158:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									(strlen("-program-name=") + strlen(m_executable) + 
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:6158:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									(strlen("-program-name=") + strlen(m_executable) + 
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:7320:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen				= (int)strlen(executable);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:7375:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
		strncat ( systemshell, "\\cmd.exe", MAX_PATH - length - 1 );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:8481:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if( read(errorpipe[0], &child_errno, sizeof(int)) == sizeof(int) ) {
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core.cpp:10139:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	maxlength = strlen(str)+1;
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:488:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp = (char*)malloc( (strlen(log) + strlen(pidFile) + 2) * 
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:488:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp = (char*)malloc( (strlen(log) + strlen(pidFile) + 2) * 
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:587:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp2 = (char*)malloc( (strlen(tmp1) + strlen(append_str) + 2)
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:587:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp2 = (char*)malloc( (strlen(tmp1) + strlen(append_str) + 2)
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:1043:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *pname = (char*)malloc (strlen(name) + 5);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:1052:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(pname, name, ext-name);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:1843:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask( 022 );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/daemon_core_main.cpp:1973:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					(char *)malloc( strlen(ptmp) + myDistro->GetLen() + 10 );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:60:14:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ( _tcslen(pszDot) >= 3 )
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/exception_handling.WINDOWS.cpp:88:5:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    _tcsncpy( m_szLogFileName, pszLogFileName, COUNTOF(m_szLogFileName) );
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/mimetypes.cpp:68:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((tuple = mime_lookup(ext, strlen(ext))) != NULL) {
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.cpp:196:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int ReadPipeEnd::read(void* buffer, int len)
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/pipe.WINDOWS.h:112:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int read(void* buffer, int len);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_core.cpp:510:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result = pcre_exec(pat, NULL, filename, strlen(filename), 0, 0, offsets, 6);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_daemon_core.cpp:31:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(char *) soap_malloc(soap, strlen(platform) + 1);
data/condor-8.6.8~dfsg.1/src/condor_daemon_core.V6/soap_daemon_core.cpp:45:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(char *) soap_malloc(soap, strlen(version) + 1);
data/condor-8.6.8~dfsg.1/src/condor_dagman/condor_submit_dag.cpp:203:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							start + (int)strlen( DAG_SUBMIT_FILE_SUFFIX) ==
data/condor-8.6.8~dfsg.1/src/condor_dagman/dag.cpp:3713:9:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			if ( sscanf( submit_event->submitEventLogNotes,
data/condor-8.6.8~dfsg.1/src/condor_dagman/dag.cpp:3763:14:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		} else if( sscanf( skip_event->skipEventLogNotes, "DAG Node: %1023s",
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_commands.cpp:132:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen( name ) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_commands.cpp:156:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen( name ) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_dagman/dagman_submit.cpp:392:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int reserveNeeded = strlen( cmdFile );
data/condor-8.6.8~dfsg.1/src/condor_dagman/jobstate_log.cpp:321:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		eventName = eventName + strlen( prefix );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:145:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( MAX_ARGV_LEN-5 < strlen(argv[i]) ) {
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:612:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						0==strnicmp(buffer3,"JOBPRIORITY", strlen("JOBPRIORITY"))
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:617:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						0==_strnicmp(buffer3,"JOBPRIORITY", strlen("JOBPRIORITY"))
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:681:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if( strlen(g.getSdfName(i)) > 1000-10 ) // we do not support too long file names
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:739:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if( strlen(g.getSdfName(i)) > bufSize-20 ) // we do not support too long file names
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:741:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( buffer, g.getSdfName(i), bufSize-10  );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:760:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if( strlen(g.getSdfName(i)) > bufSize-20 ) // we do not support too long file names
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:762:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( buffer, g.getSdfName(i), bufSize-10  );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:785:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if( strlen(g.getSdfName(i)) > bufSize-20 ) // we do not support too long file names
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/CondorDagNodeScheduler.cpp:787:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( buffer, g.getSdfName(i), bufSize-10  );
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp:105:4:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	c=fgetc(stream);
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp:108:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c=fgetc(stream);
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp:122:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c=fgetc(stream);
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp:158:4:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	c=fgetc(stream);
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp:161:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c=fgetc(stream);
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizer.cpp:187:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int c=fgetc(stream);  // we may have already read all file characters, but have not yet beyond, in which case feof(stream) is not yet true
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizerWithCont.cpp:74:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strlen(tab)>=1 && '\\'==tab[ strlen(tab)-1 ] )	{	// trailing continuation character
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizerWithCont.cpp:74:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strlen(tab)>=1 && '\\'==tab[ strlen(tab)-1 ] )	{	// trailing continuation character
data/condor-8.6.8~dfsg.1/src/condor_dagman/node_scheduler/StreamTokenizerWithCont.cpp:75:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				tab[ strlen(tab)-1 ] = '\0';						// remove the continuation character
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/dllmain.cpp:101:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				k = (char*)malloc(strlen(e.key));
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/dllmain.cpp:131:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				k = (char*)malloc(strlen(e.key));
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs.cpp:306:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cURI = malloc(strlen(host)+16);
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs.cpp:1348:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buffer, jPathChars, bufferSize);
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.cpp:421:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		optHadoopClassPathLen = strlen(hadoopClassPath) + 
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfsJniHelper.cpp:422:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(hadoopClassPathVMArg) + 1;
data/condor-8.6.8~dfsg.1/src/condor_filetransfer_plugins/hdfs_plugin.cpp:269:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (match && strlen(match) == 4) {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/ftgahp_common.cpp:34:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len=strlen(raw);
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:81:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t input_len = strlen(input);
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:105:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int msg_len = strlen( msg ) + 1;
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:120:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ( read( fd, (char *)&msg_len, sizeof(int) ) != sizeof(int) ) {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:125:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ( read( fd, *msg, msg_len ) != msg_len ) {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:143:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int bytes = read(0, buf, FORWARD_BUFFER_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:281:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					  strlen( GAHP_COMMAND_CREATE_CONDOR_SECURITY_SESSION ) ) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_ft-gahp/io_loop.cpp:558:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i=0; i<strlen(s); i++) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boincjob.cpp:742:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/boincjob.cpp:750:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
					strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:1145:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:1149:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
					strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:1583:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strlen( next_name ) > 7 ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/condorjob.cpp:1592:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strlen( next_name ) > 7 ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamjob.cpp:1260:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/creamjob.cpp:1274:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
					strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:1435:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
						strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:1438:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
						strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:2336:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( publicDNSName != NULL && strlen( publicDNSName ) != 0
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:2341:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( launchGroup != NULL && strlen( launchGroup ) != 0
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:2347:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( stateReasonCode != NULL && strlen( stateReasonCode ) != 0
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/ec2job.cpp:2364:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( instanceID != NULL && strlen( instanceID ) != 0
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:314:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	daemonCore->Write_Pipe(m_gahp_writefd,command,strlen(command));
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:340:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	daemonCore->Write_Pipe(m_gahp_writefd,command,strlen(command));
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:341:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	daemonCore->Write_Pipe(m_gahp_writefd,buf,strlen(buf));
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:343:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		daemonCore->Write_Pipe(m_gahp_writefd,args,strlen(args));
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:597:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							1 + strlen(&(g_args.argv[0][GAHP_PREFIX_LEN])));
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:1484:11:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	int rc = fscanf( fp, " %79s", auth );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:1560:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t input_len = strlen(input);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:1962:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf,result.argv[1],sizeof(buf)-1);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:4995:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
int i = strlen( desc );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gahp-client.cpp:5232:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
int i = strlen( desc );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp:864:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
						strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp:867:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
						strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp:1028:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( publicDNSName != NULL && strlen( publicDNSName ) != 0
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/gcejob.cpp:1033:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( stateReasonCode != NULL && strlen( stateReasonCode ) != 0
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:511:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( ! strlen(filename) ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:2267:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:2297:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
					strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:2902:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(attr_value);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:3397:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mode_t old_umask = umask(0);
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusjob.cpp:3445:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask( old_umask );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/globusresource.cpp:909:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(strncmp(buff, MAGIC_EOF, strlen(MAGIC_EOF)) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:981:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
								if ( !strncmp( spooldir, target, strlen( spooldir ) ) ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:1016:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if ( !strncmp( spooldir, jobProxy->proxy_filename, strlen( spooldir ) ) ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:1105:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:1109:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
					strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:1380:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strlen( next_name ) > 7 ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:1389:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strlen( next_name ) > 7 ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/infnbatchjob.cpp:1571:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 strlen( next_name ) > 7 ) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.cpp:877:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/nordugridjob.cpp:881:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
					strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/proxymanager.cpp:837:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   strlen (myProxyEntry->myproxy_password));
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/proxymanager.cpp:838:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (written < (int) strlen (myProxyEntry->myproxy_password)) {
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/proxymanager.cpp:1020:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				bytes_read = read( fd, buff, 499 );
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/unicorejob.cpp:686:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy( holdReason, errorString.c_str(),
data/condor-8.6.8~dfsg.1/src/condor_gridmanager/unicorejob.cpp:690:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
					strncpy( holdReason, "Unspecified gridmanager error",
data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp:153:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( controllee, tmp, sizeof(controllee) - 1 );
data/condor-8.6.8~dfsg.1/src/condor_had/StateMachine.cpp:157:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( controllee, daemonString(DT_NEGOTIATOR), sizeof(controllee) - 1 );
data/condor-8.6.8~dfsg.1/src/condor_had/Transferer.cpp:172:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( ! strncmp( argv[1], "down", strlen( "down" ) ) ) {
data/condor-8.6.8~dfsg.1/src/condor_had/Transferer.cpp:178:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if( ! strncmp( argv[1], "up", strlen( "up" ) ) ) {
data/condor-8.6.8~dfsg.1/src/condor_had/Utils.cpp:223:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		file.read( buffer, FILE_CHUNK_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_had/Utils.cpp:295:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		file.read( buffer, FILE_CHUNK_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_includes/buffers.h:63:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int read(char const *peer_description,SOCKET sockd, int sz=-1, int timeout=0, bool non_blocking=false);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_buffers.cpp:130:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int StdUnivBuf::read(
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_buffers.h:61:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int read(char const *peer_description,SOCKET sockd, int sz=-1, int timeout=0);
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:128:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy( _peer_ip_buf, ip_string.Value(), IP_STRING_BUF_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_io.std/std_univ_sock.cpp:436:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((tmp_len = tmp->read(peer_description, _sock, len, _timeout)) != len){
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:119:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        outgoingEidLen_   = strlen(outgoingEncKeyId_);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:159:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        outgoingMdLen_    = strlen(outgoingMD5KeyId_);
data/condor-8.6.8~dfsg.1/src/condor_io/SafeMsg.cpp:1334:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sprintf(&str[strlen(str)], "len:%lu, lastNo:%d, rcved:%d, lastTime:%lu\n",
data/condor-8.6.8~dfsg.1/src/condor_io/authentication.cpp:637:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy (local_user, can_name.Value(), 255);
data/condor-8.6.8~dfsg.1/src/condor_io/buffers.cpp:164:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int Buf::read(
data/condor-8.6.8~dfsg.1/src/condor_io/cedar_no_ckpt.cpp:492:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			nrd = ::read(fd, buf, (size_t)((bytes_to_send-total) < (int)sizeof(buf) ? bytes_to_send-total : sizeof(buf)));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth.cpp:164:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            userlen = strlen(remoteUser_);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth.cpp:168:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            domlen  = strlen(remoteDomain_);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:1236:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy ( user, client, user_len );
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:1458:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(serverPrincipal);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_kerberos.cpp:1468:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(name, serverPrincipal, size);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:92:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(passwordA) + strlen(passwordB) + 5;
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:92:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(passwordA) + strlen(passwordB) + 5;
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:274:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sk->len = strlen(const_cast<char *>(sk->shared_key));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1232:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(t_buf->a);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1243:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memcpy(buffer, t_buf->a, strlen(t_buf->a));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1290:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		send_a_len = strlen(send_a);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1354:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   || (strlen(t_client->a) == 0) 
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1356:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   || (strlen(t_server->a) == 0) || (strlen(t_server->b) == 0)
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1356:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   || (strlen(t_server->a) == 0) || (strlen(t_server->b) == 0)
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1485:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   && a && strlen(a) == strlen(t_client->a)
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1485:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   && a && strlen(a) == strlen(t_client->a)
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1486:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   && a_len == (int)strlen(a)
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1519:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			t_buf->a, (unsigned long)strlen(t_buf->a),
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1520:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			t_buf->b, (unsigned long)strlen(t_buf->b));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1530:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(t_buf->a) + strlen(t_buf->b) + 1;
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1530:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	prefix_len = strlen(t_buf->a) + strlen(t_buf->b) + 1;
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1598:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			send_a_len = strlen(send_a);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1599:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			send_b_len = strlen(send_b);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_passwd.cpp:1727:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(send_a) send_a_len = strlen(send_a);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:313:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *tmp = (char *)malloc(strlen(comment)+1);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:377:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char *one_line = (char*)malloc(1 + strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:604:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            char * rest = tmp + strlen(STR_DAEMON_NAME_FORMAT);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:605:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int totalLen = strlen(entry) + strlen(fqh);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:605:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int totalLen = strlen(entry) + strlen(fqh);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:612:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(buf, entry, strlen(entry) - strlen(tmp));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:612:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncpy(buf, entry, strlen(entry) - strlen(tmp));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:612:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncpy(buf, entry, strlen(entry) - strlen(tmp));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:613:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            tmp = buf + strlen(buf);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:618:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int remain = strlen(rest);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_auth_x509.cpp:621:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                tmp = tmp + strlen(fqh);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_crypt.cpp:121:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return Condor_MD_MAC::computeOnce((unsigned char *)const_cast<char*>(initialKey), strlen(initialKey));
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:258:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pList = (char *)malloc(strlen(pOldList) + strlen(pNewList) + 2);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_ipverify.cpp:258:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pList = (char *)malloc(strlen(pOldList) + strlen(pNewList) + 2);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:156:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy (buf, res, 1);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:239:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy (buf, res, 1);
data/condor-8.6.8~dfsg.1/src/condor_io/condor_secman.cpp:275:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy (buf, config_value, 1);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:286:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int length = strlen(buffer);
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:834:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	tmp_len = m_tmp->read(peer_description, _sock, len, _timeout, p_sock->is_non_blocking());
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1052:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(parent_state, "*");
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1057:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(parent_state, "*");
data/condor-8.6.8~dfsg.1/src/condor_io/reli_sock.cpp:1112:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t sinful_len = strlen(ptmp);
data/condor-8.6.8~dfsg.1/src/condor_io/safe_sock.cpp:858:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t sinful_len = strlen(ptmp);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:467:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(named_sock_addr.sun_path+1, sock_name.c_str(), sizeof(named_sock_addr.sun_path)-2);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:468:89:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	named_sock_addr_len = sizeof(named_sock_addr) - sizeof(named_sock_addr.sun_path) + 1 + strlen(named_sock_addr.sun_path+1);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:471:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(named_sock_addr.sun_path, sock_name.c_str(), sizeof(named_sock_addr.sun_path)-1);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_client.cpp:476:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(alt_named_sock_addr.sun_path, alt_sock_name.c_str(), sizeof(named_sock_addr.sun_path)-1);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:309:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(named_sock_addr.sun_path, m_full_name.Value(), sizeof(named_sock_addr.sun_path)-1);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:313:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(named_sock_addr.sun_path+1, m_full_name.Value(), sizeof(named_sock_addr.sun_path)-2);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:314:90:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		named_sock_addr_len = sizeof(named_sock_addr) - sizeof(named_sock_addr.sun_path) + 1 + strlen(named_sock_addr.sun_path+1);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:500:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sprintf(buf+strlen(buf), ".%03d %.100s: %d\n", tv.millitm, msg, err);
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:1475:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(default_name) + 18 > max_len) {
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_endpoint.cpp:1519:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(default_name.c_str()) + 18 > max_len) {
data/condor-8.6.8~dfsg.1/src/condor_io/shared_port_scm_rights.h:32:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(sizeof(*(su)) - sizeof((su)->sun_path) + strlen((su)->sun_path))
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2088:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * ptr = outbuf + strlen(outbuf);
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2119:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * ptr = outbuf + strlen(outbuf);
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2248:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t fqu_len = _fqu ? strlen(_fqu) : 0;
data/condor-8.6.8~dfsg.1/src/condor_io/sock.cpp:2256:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			verstring_len = strlen(verstring);
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1277:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            len = strlen(s)+1;
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1862:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(ptr);
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1864:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(s,ptr,l-1);
data/condor-8.6.8~dfsg.1/src/condor_io/stream.cpp:1869:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(s,ptr,l);
data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouterHookMgr.cpp:513:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((0 == strncmp(hook_info->key,key,strlen(hook_info->key))) &&
data/condor-8.6.8~dfsg.1/src/condor_job_router/JobRouterHookMgr.cpp:531:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((0 == strncmp(hook_info->key,key,strlen(hook_info->key))) &&
data/condor-8.6.8~dfsg.1/src/condor_job_router/VanillaToGrid_main.cpp:48:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int bytes = read(fd, buf, sizeof(buf));
data/condor-8.6.8~dfsg.1/src/condor_job_router/job_router_info.cpp:113:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int cch = strlen(message);
data/condor-8.6.8~dfsg.1/src/condor_kbdd/kbdd.cpp:325:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int argSize = ((wcslen(cmdArgs[counter]) + 1) * sizeof(char)) * 2;
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:1865:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen ( bin_path ) + strlen ( dagman_exe ) + 2 );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/master.cpp:1865:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen ( bin_path ) + strlen ( dagman_exe ) + 2 );
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:866:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			else if(strncmp( cur_arg, "-sock", strlen(cur_arg)) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1548:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int length = strlen(name_in_config_file) + 32;
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1588:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (state && strlen(state) <= strlen(ready_state)) {
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1588:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (state && strlen(state) <= strlen(ready_state)) {
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:1792:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( strncmp(controllee->name_in_config_file, controllees[num]->name_in_config_file, strlen(controllees[num]->name_in_config_file)) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:2755:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(condor_main_argv[j]);
data/condor-8.6.8~dfsg.1/src/condor_master.V6/masterDaemon.cpp:2765:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(condor_main_argv[j]);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:67:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_OFF(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:448:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(CustomerName.Value(),NiceUserName,strlen(NiceUserName))==0) {
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/Accountant.cpp:1857:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_ON(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:82:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_OFF(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:661:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t prefix_len = strlen(ATTR_NEGOTIATOR_MATCH_EXPR);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:3462:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				length = strlen(subReqs) + strlen(ATTR_REQUIREMENTS) + 7;
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:3462:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				length = strlen(subReqs) + strlen(ATTR_REQUIREMENTS) + 7;
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:3475:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				length = strlen(subReqs) + strlen(ATTR_REQUIREMENTS);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:3475:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				length = strlen(subReqs) + strlen(ATTR_REQUIREMENTS);
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:5611:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen("Saved") + strlen(ATTR_REQUIREMENTS) + 2;
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:5611:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen("Saved") + strlen(ATTR_REQUIREMENTS) + 2;
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.cpp:7055:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_ON(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.h:101:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_OFF(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_negotiator.V6/matchmaker.h:587:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_ON(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_privsep/parse_config.unix.cpp:109:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        line_len = strlen(line_buf);
data/condor-8.6.8~dfsg.1/src/condor_privsep/privsep_client.UNIX.cpp:333:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fprintf(fp, "exec-arg<%lu>\n", (unsigned long)strlen(args.GetArg(i)));
data/condor-8.6.8~dfsg.1/src/condor_privsep/privsep_client.UNIX.cpp:343:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fprintf(fp, "exec-env<%lu>\n", (unsigned long)strlen(*ptr));
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:460:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tmp = (char *) malloc(strlen(var) + strlen(val) + 2);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:460:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tmp = (char *) malloc(strlen(var) + strlen(val) + 2);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:721:24:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        int old_mask = umask(0);
data/condor-8.6.8~dfsg.1/src/condor_privsep/safe.unix.cpp:723:16:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        (void) umask(old_mask);
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:298:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if( read(fd, &psinfo, sizeof(psinfo_t)) != sizeof(psinfo_t) ) {
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi.cpp:354:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if( read(fd, &prusage, sizeof(prusage_t)) != sizeof(prusage_t) ) {
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_fork_t.cpp:169:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read(fds[i][0], temp_arr, num_nodes * sizeof(PID_ENTRY));
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_fork_t.cpp:244:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read(fds[0], arr, num_nodes*(sizeof(PID_ENTRY)));
data/condor-8.6.8~dfsg.1/src/condor_procapi/procapi_killfamily.cpp:608:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  if ( strncasecmp(searchLogin,str,strlen(searchLogin))==0 ) {
data/condor-8.6.8~dfsg.1/src/condor_procd/cgroup_tracker.linux.cpp:107:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(pos) == strlen(it->first.c_str())) {
data/condor-8.6.8~dfsg.1/src/condor_procd/cgroup_tracker.linux.cpp:107:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(pos) == strlen(it->first.c_str())) {
data/condor-8.6.8~dfsg.1/src/condor_procd/cgroup_tracker.linux.cpp:130:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int line_len = strlen(buffer);
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:67:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pidlen = strlen(pid);
data/condor-8.6.8~dfsg.1/src/condor_procd/gidd_alloc.cpp:181:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int linelen = strlen(line);
data/condor-8.6.8~dfsg.1/src/condor_procd/group_tracker.linux.cpp:125:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int line_len = strlen(buffer);
data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_reader.unix.cpp:126:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int bytes = read(m_pipe, buffer, len);
data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_util.unix.cpp:39:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int addr_len = strlen(orig_addr) +
data/condor-8.6.8~dfsg.1/src/condor_procd/named_pipe_util.unix.cpp:74:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t orig_path_len = strlen(orig_path);
data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_client.cpp:212:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int login_len = strlen(login) + 1;
data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_client.cpp:381:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cgroup_len = strlen(cgroup);
data/condor-8.6.8~dfsg.1/src/condor_procd/proc_family_client.cpp:440:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int proxy_len = strlen(proxy) + 1;
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1478:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					ownerName = argv[i]+strlen(NiceUserName)+1;
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:1662:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					wid = 0 - (int)strlen(hd);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2505:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(tmp, ".");
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2632:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( host, resource_name, p );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2642:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( jm, tmp, p );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2663:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( host, &resource_name[8], sizeof(host) );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2666:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( host, resource_name, sizeof(host) );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:2803:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ix2 = strlen(result_str);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:3475:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					sprintf(achRunning+strlen(achRunning), "%d", ac.machinesRunningUsersJobs);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4046:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		vals.cluster_width = strlen(buf);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4048:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		vals.proc_width = strlen(buf);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:4174:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int cch = strlen(name);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5187:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		value.assign(p+1,strlen(p)-2);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5572:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf( return_buff + strlen(return_buff), "Last successful match: %s", ctime(&t) );
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5588:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(return_buff + strlen(return_buff), 
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5594:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5603:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5609:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5613:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5618:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5623:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5627:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf( return_buff + strlen(return_buff),
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:5770:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy( ana_buffer, buffer_string.c_str( ), SHORT_BUFFER_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6155:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char *tstr = (char *) malloc(strlen(tmpdatabaseip)+3);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6172:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp1 = strlen(databaseName);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6173:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp2 = strlen(query_password);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6174:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(databaseIp);
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6186:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(host,
data/condor-8.6.8~dfsg.1/src/condor_q.V6/queue.cpp:6191:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	port[strlen(port)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_release/examples/env.cpp:65:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	data[ cur_size ] = new char[ strlen(str) + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_release/examples/io.c:107:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if( read(fd,buf,len) != len ) {
data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp:203:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (cmd_str && strncasecmp( cmd_str, "_hold", strlen("_hold") ) == MATCH) { 
data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp:206:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strncasecmp( cmd_str, "_release", strlen("_release") ) == MATCH ) {
data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp:209:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strncasecmp( cmd_str, "_suspend", strlen("_suspend") ) == MATCH ) {
data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp:212:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strncasecmp( cmd_str, "_continue", strlen("_continue") ) == MATCH ) {
data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp:215:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strncasecmp( cmd_str, "_rm", strlen("_rm") ) == MATCH ) {
data/condor-8.6.8~dfsg.1/src/condor_rm.V6/rm.cpp:218:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									strlen("_vacate_job")) ) {  
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/autocluster.cpp:265:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	signature.reserve(strlen(significant_attrs) + exattrs.size()*20 + sigset.size()*20); // make a guess as to how much space the signature will take.
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/autocluster.cpp:472:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			attrs.reserve(strlen(significant_target_attrs) + required_attrs.size()*30);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:1726:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(ATTR_NEGOTIATOR_MATCH_EXPR);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/dedicated_scheduler.cpp:3055:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(ATTR_NEGOTIATOR_MATCH_EXPR);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.cpp:389:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( attr_value && strlen(attr_value)==0 ) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.cpp:410:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( attr_value && strlen(attr_value)==0 ) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/grid_universe.cpp:515:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int scratch_pre_len = strlen(scratch_prefix);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:707:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		super_users[i] = new char[ strlen( tmp ) + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:810:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( !strncmp(v.Value(),o,strlen(o)) ) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:812:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				np += v.Value() + strlen(o);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:828:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( !strncmp(op,o,strlen(o)) ) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:830:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				np += op + strlen(o);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3339:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(encoded_value);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3425:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int bytes = read (fd, buff, sizeof(buff) - 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3451:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (; i<strlen (src); i++) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3453:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c=(c+key)%strlen(mesh);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3470:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (; j<strlen(src); j++) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3473:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i=0; i<strlen (mesh); i++) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3480:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c=(c+strlen(mesh)-(key%strlen(mesh)))%strlen(mesh);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3480:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c=(c+strlen(mesh)-(key%strlen(mesh)))%strlen(mesh);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:3480:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c=(c+strlen(mesh)-(key%strlen(mesh)))%strlen(mesh);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4343:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					int old_size = strlen(attribute_value);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4364:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t namelen = strlen(name);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4472:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							char *rebuild = (char *) malloc(  strlen(name)
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4475:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
								+ strlen(fallback)
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4528:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						int endquoteindex = strlen(tvalue) - 1;
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4534:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					size_t lenBigbuf = strlen(left) + strlen(tvalue)  + strlen(right);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4534:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					size_t lenBigbuf = strlen(left) + strlen(tvalue)  + strlen(right);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4534:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					size_t lenBigbuf = strlen(left) + strlen(tvalue)  + strlen(right);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4539:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					attribute_value = (char *) malloc(  strlen(curr_attr_to_expand)
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:4587:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(ATTR_NEGOTIATOR_MATCH_EXPR);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:5456:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(powner,".");
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:5457:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int cch = strlen(powner);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.cpp:5892:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (user && (strlen(user) == 0)) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/qmgmt.h:231:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(job_id_str, jid, sizeof(job_id_str));
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:5224:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( !proxy_path || strncmp(SpoolSpace,proxy_path,strlen(SpoolSpace)) ) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:5562:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int size = strlen(tmp) + strlen(owner) + 14;
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:5562:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int size = strlen(tmp) + strlen(owner) + 14;
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:5659:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int size = strlen(buf) + strlen(value) + 3;
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:5659:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int size = strlen(buf) + strlen(value) + 3;
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/schedd.cpp:15520:8:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			if (fscanf(fp,"%150s\n",claim_id) != 1) {
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:147:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(char *) soap_malloc(soap, strlen(info->name) + 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1000:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					soap_malloc(soap, strlen(errstack.message()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1155:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(char *) soap_malloc(soap, strlen(errstack.message()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1218:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(char *) soap_malloc(soap, strlen(errstack.message()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1267:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(char *) soap_malloc(soap, strlen(errstack.message()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1308:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				soap_malloc(soap, strlen(errstack.message()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1395:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(char *) soap_malloc(soap, strlen(errstack.message()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1417:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(char *) soap_malloc(soap, strlen(errstack.message()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_schedd.V6/soap_scheddStub.cpp:1550:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(char *) soap_malloc(soap, strlen(buffer) + 1);
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:72:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(n);
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:91:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		command_size += strlen(argv[index]);
data/condor-8.6.8~dfsg.1/src/condor_scripts/winmpichrun.cpp:101:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(command, " ");
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:512:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rval = read( fd , buf , len);
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/NTreceivers.cpp:1267:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			rval = read( fd , buf , length);
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:503:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int size = strlen( reason ) + strlen( ATTR_REMOVE_REASON ) + 4;
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:503:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int size = strlen( reason ) + strlen( ATTR_REMOVE_REASON ) + 4;
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:778:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int size = strlen( reason ) + strlen( ATTR_REQUEUE_REASON ) + 4;
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/baseshadow.cpp:778:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int size = strlen( reason ) + strlen( ATTR_REQUEUE_REASON ) + 4;
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:77:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read( fd, &c, 1 );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:87:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = read( fd, &c, 1 );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:277:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read( fds[0], &result, sizeof(int) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:349:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read( fds[0], &result, sizeof(DCStarter::X509UpdateStatus) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.V6.1/remoteresource.cpp:354:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read( fds[0], result_expiration_time, sizeof(time_t) );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/job_report.cpp:75:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int cch = strlen(message)+1;
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/job_report.cpp:76:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (context) { cch += strlen(context) + 4; }
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:359:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_suspend = strlen(magic_suspend);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/log_events.cpp:360:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_unsuspend = strlen(magic_unsuspend);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/ops.cpp:142:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		len=read(LogSock,buf,sizeof(buf)-1);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:392:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	omask = umask( 022 );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:396:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		(void)umask(omask);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:399:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void)umask(omask);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:474:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if( read(fd,buf,len) < len ) {
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:609:12:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			omask = umask( 022 );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:615:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			(void)umask( omask );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:657:12:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			omask = umask( 022 );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:660:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			(void)umask( omask );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:932:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	omask = umask( 022 );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:960:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		(void)umask(omask);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:964:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void)umask(omask);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1500:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	method = (char *)malloc(strlen(url)+1);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1501:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	physical_name = (char *)malloc(strlen(url)+1);
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1705:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen ( fs_domain ) < MAX_STRING ) {
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1720:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen( uid_domain ) < MAX_STRING ) {
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1949:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	omask = umask( 022 );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:1964:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void)umask( omask );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/pseudo_ops.cpp:2073:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        rval = read( fd, buf, len );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1301:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy( CkptName, "" );
data/condor-8.6.8~dfsg.1/src/condor_shadow.std/shadow.cpp:1302:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy( TmpCkptName, "" );
data/condor-8.6.8~dfsg.1/src/condor_soapshell/soapshell_main.cpp:78:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int input_length = strlen(input);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/AvailStats.t.cpp:37:14:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((c = getchar()) != EOF) {
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/AvailStats.t.cpp:65:15:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ((c = getchar()) != EOF && c != '\n');
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/Reqexp.cpp:228:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				std::string wrlimit(climit,strlen(climit)-1);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResAttributes.h:158:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t cchValue = value ? strlen(value)+1 : 1;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/ResAttributes.h:159:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t cchAttr  = strlen(pszAttr) + 1;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/glexec_starter.linux.cpp:91:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	random_part += strlen(random_part) - 6;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/glexec_starter.linux.cpp:385:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t bytes = read(sock_fd, err, sizeof(err) - 1);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_params.cpp:89:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unsigned  len = strlen(m_libexec) + strlen(exe) + 2;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_params.cpp:89:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unsigned  len = strlen(m_libexec) + strlen(exe) + 2;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/startd_bench_job_params.cpp:95:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat( buf, "/" );
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:477:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cchPrefix = pszPrefix ? strlen(pszPrefix) : 0;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:505:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	psz = pszKeyName + strlen(pszKeyName);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:518:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cch = strlen(psz);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:522:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cch += strlen("Percent");
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:529:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cch += strlen("_Per_");
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:553:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pszT += strlen(pszT)-1;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:559:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pszT += strlen(pszT)-1;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:578:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cch = strlen(pszAttr);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1519:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cch += (int)strlen(pszUnits);
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1797:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int cchAttr  = strlen(pszAttr) + 1;
data/condor-8.6.8~dfsg.1/src/condor_startd.V6/winreg.windows.cpp:1813:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy((char*)(pquery+1), pkey + query.ixInst, query.cchInst);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:771:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int str_len = strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:798:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	start += strlen(begin_marker);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:830:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	start += strlen(begin_marker);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/baseStarter.cpp:3366:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int cchresid = (int)strlen(resid);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/docker_proc.cpp:645:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				char *volumePath2 = (char *)malloc(1 + 2 * strlen(volumePath));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/docker_proc.cpp:647:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
				strcat(volumePath2, ":");
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:119:3:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
		sprintf(line,"0");
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:235:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ASSERT( strlen(url) < CHIRP_LINE_MAX );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:237:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(path,url+7,CHIRP_LINE_MAX);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:239:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(path,url+14,CHIRP_LINE_MAX);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:251:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(path,url,CHIRP_LINE_MAX);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:285:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			r->put_bytes_raw(buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:361:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(line,"%u",(unsigned int)strlen(url));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:363:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			r->put_bytes_raw(url,strlen(url));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:375:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(expr) > 993)
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:377:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			dprintf(D_FULLDEBUG, "Chirp update too long! (%lu)\n", strlen(expr));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:405:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sprintf(line,"%u",(unsigned int)strlen(recv_expr));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:407:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			r->put_bytes_raw(recv_expr,strlen(recv_expr));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:569:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				r->put_bytes_raw(buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:585:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				r->put_bytes_raw(buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:653:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			r->put_bytes_raw(buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:663:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			r->put_bytes_raw(buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:728:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				r->put_bytes_raw(buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:744:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				r->put_bytes_raw(buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:760:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				r->put_bytes_raw(buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:876:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(temp_path, path+2, CHIRP_LINE_MAX);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/io_proxy_handler.cpp:881:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(temp_path, path+1, CHIRP_LINE_MAX);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/java_proc.cpp:257:14:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
				fields = fscanf(file,"%10s",tmp); // no more than sizeof(tmp)
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:950:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(uid_domain) + strlen(ATTR_UID_DOMAIN) + 5;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:950:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(uid_domain) + strlen(ATTR_UID_DOMAIN) + 5;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:957:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(fs_domain) + strlen(ATTR_FILE_SYSTEM_DOMAIN) + 5;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:957:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(fs_domain) + strlen(ATTR_FILE_SYSTEM_DOMAIN) + 5;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:977:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(tmp_val) + strlen(ATTR_ARCH) + 5;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:977:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(tmp_val) + strlen(ATTR_ARCH) + 5;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:986:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(tmp_val) + strlen(ATTR_OPSYS) + 5;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:986:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(tmp_val) + strlen(ATTR_OPSYS) + 5;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:996:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(tmp_val) + strlen(ATTR_CKPT_SERVER) + 5; 
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:996:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(tmp_val) + strlen(ATTR_CKPT_SERVER) + 5; 
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/jic_shadow.cpp:1005:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(ATTR_HAS_RECONNECT) + 6;
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter_v61_main.cpp:214:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(argv[i]);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/starter_v61_main.cpp:400:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		opt_len = strlen( opt );
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:172:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t		joblen				= strlen(jobtmp);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vanilla_proc.cpp:1130:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			int r = read(efd, &oomData, 8);
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:793:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( daemonCore->Write_Pipe(m_vmgahp_writefd,command,strlen(command)) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:824:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( daemonCore->Write_Pipe(m_vmgahp_writefd,command,strlen(command)) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:833:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( daemonCore->Write_Pipe(m_vmgahp_writefd,args,strlen(args)) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1391:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( !strncasecmp( name, "JobVM", strlen("JobVM") ) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1392:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				!strncasecmp( name, "VMPARAM", strlen("VMPARAM") ) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1393:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				!strncasecmp( name, ATTR_CLUSTER_ID, strlen(ATTR_CLUSTER_ID)) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1394:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				!strncasecmp( name, ATTR_PROC_ID, strlen(ATTR_PROC_ID)) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1395:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				!strncasecmp( name, ATTR_USER, strlen(ATTR_USER)) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1397:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(ATTR_ORIG_JOB_IWD)) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1399:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(ATTR_JOB_ARGUMENTS1)) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1401:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(ATTR_JOB_ARGUMENTS2)) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1403:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(ATTR_TRANSFER_INTERMEDIATE_FILES)) ||
data/condor-8.6.8~dfsg.1/src/condor_starter.V6.1/vm_gahp_server.cpp:1405:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(ATTR_TRANSFER_INPUT_FILES)) ) {
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_common.cpp:116:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp2 = (char*)malloc( (strlen(tmp1) + strlen(logAppend) + 2) *
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_common.cpp:116:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp2 = (char*)malloc( (strlen(tmp1) + strlen(logAppend) + 2) *
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_main.cpp:655:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int result = write(CLIENT_LOG, msg, strlen(msg));
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_main.cpp:669:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	result = write(CLIENT_LOG, msg, strlen(msg));
data/condor-8.6.8~dfsg.1/src/condor_starter.std/starter_main.cpp:1189:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	REMOTE_CONDOR_register_ckpt_platform( ckptpltfrm, strlen(ckptpltfrm) + 1);
data/condor-8.6.8~dfsg.1/src/condor_starter.std/test_it.cpp:232:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int		len = strlen( targ );
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1314:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		physical_name = (char *)malloc(strlen(logical_name)+7);
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1396:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = new char [ strlen(s.cmd) + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1441:10:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	omask = umask(0);
data/condor-8.6.8~dfsg.1/src/condor_starter.std/user_proc.cpp:1461:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void)umask(omask);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1224:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(temp, type, sizeof(temp));
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1363:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						size_t cch = strlen(pszz);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/prettyPrint.cpp:1366:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							pszz += cch+1; cch = strlen(pszz);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:431:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					int len = strlen(subtot_key);
data/condor-8.6.8~dfsg.1/src/condor_status.V6/status.cpp:1936:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					wid = 0 - (int)strlen(hd); 
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2131:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int REMOTE_PREFIX_LEN = strlen(REMOTE_PREFIX);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2261:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * pe = p + strlen(p);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:2328:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(my_name, tmp, sizeof(my_name));
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:3322:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char * rname = key + strlen(RequestPrefix);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:3866:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(*macro_value != '"' || macro_value[1] == '\0' || macro_value[strlen(macro_value)-1] != '"') {
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:3871:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		macro_value[strlen(macro_value)-1] = '\0';  //get rid of terminal quote
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:6570:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned prefixLength = strlen( EC2ParamPrefix );
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:6632:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int prefix_len = strlen(ATTR_EC2_TAG_PREFIX);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7257:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buf, sz, cch); buf[cch-1] = 0;
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:7443:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int cch = strlen(plist);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:8468:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if ( ! pitem || (pitem->raw_value != EmptyItemString && 0 == strlen(pitem->raw_value))) {
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:8823:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(orig) ) {
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:9067:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char * rname = key + strlen(RequestPrefix);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:9349:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = strlen(name);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:9700:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(preview,ut64, 63);
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:10126:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask( 002 );
data/condor-8.6.8~dfsg.1/src/condor_submit.V6/submit.cpp:10979:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strlen(items_list) > 50) { items_list[50] = 0; items_list[49] = '.'; items_list[48] = '.'; items_list[46] = '.'; }
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:580:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char tmp_info[strlen(tmp_opsys_short_name) + 1 + 10];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:616:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(tmp_str);
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:864:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char tmp_opsys_versioned[strlen(tmp_opsys) + 1 + 10];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1217:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	d[0] = buf->machine[ strlen( buf->machine ) - 4 ];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch.cpp:1218:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	d[1] = buf->machine[ strlen( buf->machine ) - 3 ];
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch_t.cpp:41:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (foo == NULL || strlen(foo) <= 0 || (strcmp(foo, "UNKNOWN")==0)) {
data/condor-8.6.8~dfsg.1/src/condor_sysapi/arch_t.cpp:45:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (bar == NULL || strlen(bar) <= 0 || (strcmp(bar, "UNKNOWN")==0)) {
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:56:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(opsys) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:57:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(arch) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:58:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(kernel_version) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:59:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(memory_model) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:60:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(vsyscall_page) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:61:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(processor_flags) + 1; /*nul*/;
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:63:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(opsys) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:64:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(arch) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:65:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(kernel_version) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:66:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(memory_model) + 1 /*space*/ +
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:67:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(processor_flags) + 1 /*nul*/;
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:77:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(_sysapi_ckptpltfrm, " ");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:79:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(_sysapi_ckptpltfrm, " ");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:81:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(_sysapi_ckptpltfrm, " ");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:84:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(_sysapi_ckptpltfrm, " ");
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ckptpltfrm.cpp:87:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(_sysapi_ckptpltfrm, " " );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus.cpp:471:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( strlen(buf) >= 1 ) {
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus.cpp:472:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp = (buf - 1 + strlen(buf));
data/condor-8.6.8~dfsg.1/src/condor_sysapi/ncpus.cpp:484:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( strlen( buf ) < 2 ) {
data/condor-8.6.8~dfsg.1/src/condor_sysapi/processor_flags.cpp:65:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                newBuffer = buffer + strlen( buffer );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/processor_flags.cpp:147:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int curFlagLength = (int)strlen( flagNames[i] );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/processor_flags.cpp:181:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy( currentFlag, flagStart, flagSize );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/processor_flags.cpp:199:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int length = (int)strlen( flags[i] );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/processor_flags.cpp:214:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if( strlen( flags[i] ) ) {
data/condor-8.6.8~dfsg.1/src/condor_sysapi/processor_flags.cpp:216:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat( processor_flags, " " );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/reconfig.cpp:130:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const unsigned int striplen = strlen( striptxt );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/reconfig.cpp:134:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      strlen( devname ) > striplen ) {
data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.cpp:486:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
				strcpy( uname, "" );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.cpp:492:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if ( !strncmp( buf, "UNAME:", 6 ) && ( strlen(buf) > 6 ) ){
data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.cpp:498:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
							strncpy( uname, buf+6, sizeof(uname) );
data/condor-8.6.8~dfsg.1/src/condor_sysapi/test.cpp:555:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( strlen( uname ) ) {
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:66:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		(void)strcat( pathname, "/" );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:115:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( buf, my_buf, bufsize );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/extern_path.c:231:10:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			(void)strcat( up, "/" );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/getcwd.c:85:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( (strlen(tmpbuf) + 1) > size ) {
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/remote_startup.c:252:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ckpt_file = (char *)malloc(strlen(argv[0])+6);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:76:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
REMAP_THREE( read, __read, ssize_t, int, __ptr_t, size_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:101:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
REMAP_THREE( read, __read_nocancel, ssize_t , int , void* , size_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:113:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
REMAP_THREE( read, __libc_read, ssize_t, int, __ptr_t, size_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:218:12:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
REMAP_ONE( umask, __umask, mode_t , mode_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:369:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	return strncpy(dest, src, destlen);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:512:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return read (fd, buf, nbytes);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:584:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	return strncat(s1, s2, n);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:589:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	return strncpy(s1, s2, n);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:692:9:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
	return wcsncat(dest, src, destlen);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:704:9:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings.
	return wcsncat(dest, src, n);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:710:9:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	return wcsncpy(dest, src, n);
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:782:12:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
REMAP_TWO( memalign, __libc_memalign, void*, size_t, size_t )
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.remap-LINUX.h:793:10:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
	* ptr = memalign( alignment, size );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:205:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
								strlen(buf[0].d_name) - 1;
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1610:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		cc = read( fd, iov->iov_base, iov->iov_len );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1878:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return shell( command, strlen(command) + 1 );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/switches.special.cpp:1902:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			envsize += strlen(*ev) + 3;
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/xfer_file.c:86:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nbytes = read( local_fd, buf, nbytes );
data/condor-8.6.8~dfsg.1/src/condor_syscall_lib/xfer_file.c:151:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nbytes = read( remote_fd, buf, nbytes );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_combo-sanity_std.c:68:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(2, buf, strlen(buf)) == -1)
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_combo-sanity_std.c:93:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (write(2, buf, strlen(buf)) == -1)
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_constructor_std.cpp:41:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	string = new char[ strlen(init) + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_constructor_std.cpp:50:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	string = new char[ strlen(str) + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_env_std.cpp:65:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	data[ cur_size ] = new char[ strlen(str) + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_io-async_std.c:140:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while ( (bytes_read = read(fd, ptr, len-count)) > 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_lfs_std.c:55:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nread = read(fd, ptr, nleft);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_memory-file_std.cpp:208:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				memory.read(buffer,length);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_memory-file_std.cpp:210:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read(fd,buffer2,length);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_ckpt_socket-support_std.c:135:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(strlen(buffer)==2) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_bigenv.c:83:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (strlen(value) != 1000) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_bigenv.c:85:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   variable_name, (int)strlen(value), value);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_chirp_par.cpp:120:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				tstmsglen = strlen(tstmessage);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_core_compressfiles.c:54:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	readcnt = read( rfd, buf, 256 );
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:312:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		this_read = read(fd, buf, size - bytes_read);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:2732:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	ret = umask(cmask);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:2939:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = handle_gez(ret = full_write(fd, buf, strlen(buf)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3347:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, write_test(fd, passage, strlen(passage)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3351:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, read_test(fd, readbuf, strlen(passage)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3353:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(passage, readbuf, strlen(passage)) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3370:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, fwrite_test(passage, strlen(passage), 1, fp));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3395:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, fwrite_test(passage, strlen(passage), 1, fp));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3401:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, fread_test(readbuf, strlen(passage), 1, fp));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3403:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(passage, readbuf, strlen(passage)) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3460:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, write_test(fd, passage, strlen(passage)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3466:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_val(strlen(passage), buf.st_size);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3477:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, fwrite_test(passage, strlen(passage), 1, fp));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3483:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_val(strlen(passage), buf.st_size);
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3625:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, write_test(fd, passage, strlen(passage)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3652:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, read_test(fd2, readbuf, strlen(passage)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3654:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(passage, readbuf, strlen(passage)) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3686:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, write_test(fd, passage, strlen(passage)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3713:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, read_test(fd2, readbuf, strlen(passage)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:3715:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(passage, readbuf, strlen(passage)) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4261:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(snd1, rcv1, strlen(passage)) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4268:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(snd2, rcv2, strlen(passage)) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4275:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(snd3, rcv3, strlen(passage)) != 0) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4504:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	passed = expect_gez(SUCCESS, write_test(fd, passage, strlen(passage)));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_all-syscalls_std.c:4592:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		STR(passage), strlen(passage));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:70:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( (rval=write(1,Hello,strlen(Hello))) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:75:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if( (rval=read(0,Buf1,sizeof(Buf1))) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:105:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( (rval=write(1,Buf1,strlen(Buf1))) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:115:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( (rval=write(fd,Hello,strlen(Hello))) < 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:133:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(buf1) != size ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_hello_std.c:137:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(buf2) != size ) {
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_truncate_std.c:43:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	write(fd,buffer,strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_tests/job_rsc_truncate_std.c:52:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	pos = read( fd, input, 80 );
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_chirpio.cpp:119:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tstmsglen = strlen(tstmessage);
data/condor-8.6.8~dfsg.1/src/condor_tests/lib_eventlog_base.cpp:65:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char	*p = new char[strlen(s)+1];
data/condor-8.6.8~dfsg.1/src/condor_tests/x_conditional_params.cpp:250:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				p += strlen(p);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:406:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t  s1l = strlen(s1);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_job_mem_checker.c:407:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t  s2l = strlen(s2);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_tightloop.cpp:121:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((const char*)bigbuff);
data/condor-8.6.8~dfsg.1/src/condor_tests/x_write_joblog.cpp:304:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
	strncat(shadowexceptionevent.message,"shadow message", 15);
data/condor-8.6.8~dfsg.1/src/condor_tools/advertise.cpp:152:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-tcp",strlen(argv[i]))) {
data/condor-8.6.8~dfsg.1/src/condor_tools/advertise.cpp:154:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-udp",strlen(argv[i]))) {
data/condor-8.6.8~dfsg.1/src/condor_tools/advertise.cpp:156:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-multiple",strlen(argv[i]))) {
data/condor-8.6.8~dfsg.1/src/condor_tools/advertise.cpp:182:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-many-connections", strlen(argv[i]))) { 
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:424:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(argv[1]);
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:425:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		baselen = strlen(base);
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:521:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp(_cpath, opt, strlen(opt)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:528:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp(_clust, opt, strlen(opt)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:539:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( strncmp(_cpath, opt, strlen(opt)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:580:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp(_pool, opt, strlen(opt)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:587:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp(_proc, opt, strlen(opt)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:598:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( strncmp(_pool, opt, strlen(opt)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:638:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-version", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:645:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-help", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:652:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-debug", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:662:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-address", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:684:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-name", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:712:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-fast", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:724:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-requirements", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:741:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-id", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:758:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-jobad", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:775:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-keyword", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:796:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-lease", *tmp, strlen(*tmp)) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:812:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-timeout", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/cod_tool.cpp:823:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp("-x509proxy", *tmp, strlen(*tmp)) ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_gpu_discovery.cpp:268:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(p->name, dev->name, sizeof(p->name));
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:216:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *tmp = malloc(strlen(Opt.release_dir) 
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:217:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   + strlen(control_script) + 2); 
data/condor-8.6.8~dfsg.1/src/condor_tools/condor_setup.c:730:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	attr_len = strlen(string);
data/condor-8.6.8~dfsg.1/src/condor_tools/convert_history.cpp:96:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( strncmp(Readbuf.Value(), HISTORY_DELIM, strlen(HISTORY_DELIM)) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/convert_history.cpp:111:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncmp(Readbuf.Value(), CLUSTERID, strlen(CLUSTERID)) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/convert_history.cpp:114:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			}else if( strncmp(Readbuf.Value(), PROCID, strlen(PROCID)) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/convert_history.cpp:117:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			}else if( strncmp(Readbuf.Value(), OWNER, strlen(OWNER)) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/convert_history.cpp:120:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			}else if( strncmp(Readbuf.Value(), COMPLETIONDATE, strlen(COMPLETIONDATE)) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:287:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  databaseIp = (char *) malloc(strlen(tmpdatabaseip)+3);
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:302:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  tmp1 = strlen(databaseName);
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:303:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  tmp2 = strlen(queryPassword);
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:304:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(databaseIp);
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:316:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(host,
data/condor-8.6.8~dfsg.1/src/condor_tools/dump_history.cpp:321:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  port[strlen(port)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:294:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( strlen(ntdomain) > 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/give_interactive.cpp:295:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if ( strlen(ntdomain) > 80 ) {
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:920:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int wid = width ? width : strlen(heading);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:927:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int wid = width ? width : strlen(heading);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1032:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  databaseIp = (char *) malloc(strlen(tmpdatabaseip)+3);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1047:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  tmp1 = strlen(databaseName);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1048:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  tmp2 = strlen(queryPassword);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1049:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(databaseIp);
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1061:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(host,
data/condor-8.6.8~dfsg.1/src/condor_tools/history.cpp:1066:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  port[strlen(port)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:175:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy( tmp_name, "/proc/", PATH_MAX );
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:176:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat( tmp_name, proc_dir->d_name,
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:177:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (PATH_MAX - strlen(tmp_name)) );
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:178:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
            strncat( tmp_name, "/cmdline",
data/condor-8.6.8~dfsg.1/src/condor_tools/kill.cpp:179:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (PATH_MAX - strlen(tmp_name)) );
data/condor-8.6.8~dfsg.1/src/condor_tools/load_history.cpp:226:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(DBIpAddress);
data/condor-8.6.8~dfsg.1/src/condor_tools/load_history.cpp:232:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(host, DBIpAddress, 
data/condor-8.6.8~dfsg.1/src/condor_tools/load_history.cpp:236:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(port, ptr_colon+1, len);
data/condor-8.6.8~dfsg.1/src/condor_tools/load_history.cpp:238:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		port[strlen(ptr_colon+1)] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:365:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(!strncmp(argv[i],"-help",strlen(argv[i]))) {
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:368:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-quiet",strlen(argv[i]))) {	
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:376:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-table",strlen(argv[i]))) {	
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:384:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-verbose",strlen(argv[i]))) {	
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:392:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-config",strlen(argv[i]))) {	
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:400:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-pool",strlen(argv[i]))) {	
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:413:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-name",strlen(argv[i]))) {	
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:426:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-type",strlen(argv[i]))) {	
data/condor-8.6.8~dfsg.1/src/condor_tools/ping.cpp:439:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if(!strncmp(argv[i],"-address",strlen(argv[i]))) {	
data/condor-8.6.8~dfsg.1/src/condor_tools/preen.cpp:336:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    history_length = strlen(history);
data/condor-8.6.8~dfsg.1/src/condor_tools/preen.cpp:340:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   	startd_history_length = strlen(startd_history);
data/condor-8.6.8~dfsg.1/src/condor_tools/preen.cpp:394:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (   strlen(f) >= history_length 
data/condor-8.6.8~dfsg.1/src/condor_tools/preen.cpp:402:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen(f) >= startd_history_length &&
data/condor-8.6.8~dfsg.1/src/condor_tools/preen.cpp:466:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(name) < 4) || (strncmp(name, "exe-", 4) != 0)) {
data/condor-8.6.8~dfsg.1/src/condor_tools/preen.cpp:512:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return atoi(ptr + strlen(pattern) );
data/condor-8.6.8~dfsg.1/src/condor_tools/probe_process.cpp:71:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(arg, thing, strlen(thing)) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:306:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(named_sock_addr.sun_path,fdpass_sock_name,sizeof(named_sock_addr.sun_path)-1);
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:688:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(named_sock_addr.sun_path,fdpass_sock_name.Value(),sizeof(named_sock_addr.sun_path)-1);
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:730:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mode_t old_umask = umask(077);
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:742:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
		umask(old_umask);
data/condor-8.6.8~dfsg.1/src/condor_tools/ssh_to_job.cpp:746:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_umask);
data/condor-8.6.8~dfsg.1/src/condor_tools/stats.cpp:312:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(LinePtr)==0) break;
data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp:97:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		SecureZeroMemory(pw, strlen(pw));
data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp:197:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					SecureZeroMemory(pw, strlen(pw));
data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp:399:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
							strncpy(opts->pw, argv[i+1], MAX_PASSWORD_LENGTH);
data/condor-8.6.8~dfsg.1/src/condor_tools/store_cred_main.cpp:432:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						   		at_ptr == opts->username+strlen(opts->username)-1) {
data/condor-8.6.8~dfsg.1/src/condor_tools/testwritelog.cpp:272:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return atoi(ptr + strlen(pattern) );
data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp:368:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen( argv[1] );
data/condor-8.6.8~dfsg.1/src/condor_tools/tool.cpp:2010:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strncasecmp(s1, s2, strlen(s2));
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:690:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int cchKey = strlen(keyword);
data/condor-8.6.8~dfsg.1/src/condor_tools/transform_ads.cpp:925:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( ! pitem || (pitem->raw_value != EmptyItemString && 0 == strlen(pitem->raw_value))) {
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1337:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int cchSrc = pszSrc ? strlen(pszSrc)+1 : 0;
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1344:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int cchSrc = pszSrc ? strlen(pszSrc)+1 : 0;
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1392:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int cch = strlen(sz);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1397:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cch = strlen(sz);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1472:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   const int min_name = strlen(UserCountStr);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1503:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      CopyAndPadToWidth(Line+ix, aCols[ii].pHead+strlen(aCols[ii].pHead)+1, aCols[ii].width+1, ' ', PAD_CENTER);
data/condor-8.6.8~dfsg.1/src/condor_tools/user_prio.cpp:1557:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pszName +=  strlen(LR[j].AcctGroup.Value())+1;
data/condor-8.6.8~dfsg.1/src/condor_tools/version.cpp:98:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fullpath = (char *)malloc(strlen(path) + 24);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Directory.cpp:2646:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bool found = dir.Find_Named_Entry(ret_val+strlen(temp_dir)+1);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Directory.cpp:2669:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bool found = dir.Find_Named_Entry(ret_val+strlen(temp_dir)+1);
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:583:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	emit_retval("%d", strlen(param));
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:586:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(one.Length() != (signed)strlen(param)) {
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:598:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	emit_retval("%d", strlen(param));
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_MyString.cpp:601:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(two.Length() != (signed)strlen(param)) {
data/condor-8.6.8~dfsg.1/src/condor_unit_tests/OTEST_Old_Classads.cpp:7628:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	emit_param("size", "%d", strlen(classad_string));
data/condor-8.6.8~dfsg.1/src/condor_userlog/userlog.cpp:319:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ip_addr, host+1, sizeof(ip_addr)-1);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogEntry.cpp:133:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
ClassAdLogEntry::equal(ClassAdLogEntry* caLogEntry)
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogEntry.h:68:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	int				 	equal(ClassAdLogEntry* caLogEntry);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.cpp:141:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cch = strlen(jqn);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.cpp:472:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ch = fgetc(fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogParser.cpp:489:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ch = fgetc(fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogProber.cpp:242:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	   caLogParser.getCurCALogEntry()->equal(curCALogEntry)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/ClassAdLogProber.cpp:247:36:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			caLogParser.getCurCALogEntry()->equal(curCALogEntry)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/HashTable.cpp:68:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size = strlen(key);
data/condor-8.6.8~dfsg.1/src/condor_utils/LoadPlugins.cpp:96:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (0 == strcmp(".so", plugin_file + strlen(plugin_file) - 3)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:141:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t s_len = s ? strlen(s) : 0;
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:162:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( Data, s, s_len );
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:189:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy( buf, Data, newlen ); 
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:258:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    append_str( s, (int)strlen( s ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:280:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( Data + Len, pCopy, s_len); // b/c you invalided s w/reserve_at_least
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:285:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( Data + Len, s, s_len);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:336:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int s_len = (int)strlen( tmp );
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:349:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int s_len = (int)strlen( tmp );
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:362:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int s_len = (int)strlen( tmp );
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:375:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int s_len = (int)strlen( tmp );
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:388:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int s_len = (int)strlen( tmp );
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:575:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(tmp,Data+pos1,len);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:677:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int iToReplaceLen = (int)strlen(pszToReplace);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:682:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int iWithLen = (int)strlen(pszReplaceWith);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:907:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	set_len = (int)strlen(set);
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:974:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((!S1.Data || !S1.Length()) && (!S2 || !strlen(S2))) {
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:988:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((!S2.Data || !S2.Length()) && (!S1 || !strlen(S1))) {
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:1152:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tokenBuf = new char[strlen(Value()) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:1154:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strlen(tokenBuf) > 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:1166:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( !delim || strlen(delim) == 0 ) result = NULL;
data/condor-8.6.8~dfsg.1/src/condor_utils/MyString.cpp:1181:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( skipBlankTokens && result && strlen(result) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/access_euid.unix.cpp:47:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *pathbuf = (char *)malloc(strlen(path) + 100);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:380:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cch = strlen(pszz);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:384:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cch = strlen(pszz);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:911:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						if ((fmt->options & FormatOptionAutoWidth) && strlen(fmt->printfFmt) == 2) {
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:956:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						if ((fmt->options & FormatOptionAutoWidth) && strlen(fmt->printfFmt) == 2) {
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1601:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t col_width = pszVal ? strlen(pszVal) : 0;
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1843:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						if ((fmt->options & FormatOptionAutoWidth) && strlen(fmt->printfFmt) == 2) {
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:1888:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						if ((fmt->options & FormatOptionAutoWidth) && strlen(fmt->printfFmt) == 2) {
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:2197:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *x = new char [strlen (str) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.cpp:2309:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			wid = 0 - (int)strlen(hd);
data/condor-8.6.8~dfsg.1/src/condor_utils/ad_printmask.h:233:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (index >= 0 && index < cols) return strlen(pdata[index]);
data/condor-8.6.8~dfsg.1/src/condor_utils/basename.cpp:62:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char *pend = filename + strlen(filename);
data/condor-8.6.8~dfsg.1/src/condor_utils/chomp.cpp:28:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( (size = strlen(buffer)) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/ckpt_util.cpp:84:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytes_read = read( src_fd, buf, read_size );
data/condor-8.6.8~dfsg.1/src/condor_utils/ckpt_util.cpp:151:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytes_read = read( src_fd, buf, read_size );
data/condor-8.6.8~dfsg.1/src/condor_utils/classadHistory.cpp:510:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    history_base_length = strlen(history_base);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_hashtable.cpp:87:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ssize_t i = strlen( str ) - 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_helpers.cpp:436:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (delim) cchAttr += strlen(delim);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:614:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(buf);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:682:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rval = fwrite(key, sizeof(char), strlen(key), fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:683:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rval < (int)strlen(key)) return -1;
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:694:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rval1 = fwrite(s, sizeof(char), strlen(s), fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:695:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rval1 < (int)strlen(s)) return -1;
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:707:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rval1 = fwrite(s, sizeof(char), strlen(s),fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:708:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rval1 < (int)strlen(s)) return -1;
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:756:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (val && strlen(val) && !blankline(val) &&
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:818:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(key);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:828:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:839:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(value);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:921:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(key);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:931:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.cpp:1071:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int ll = strlen(line);
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.h:331:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	virtual int WriteBody(FILE* fp) { size_t r=fwrite(key, sizeof(char), strlen(key), fp); return (r < strlen(key)) ? -1 : (int)r;}
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_log.h:331:101:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	virtual int WriteBody(FILE* fp) { size_t r=fwrite(key, sizeof(char), strlen(key), fp); return (r < strlen(key)) ? -1 : (int)r;}
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_oldnew.cpp:485:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        serverTimeStr = (char *) malloc(strlen(ATTR_SERVER_TIME)
data/condor-8.6.8~dfsg.1/src/condor_utils/classad_oldnew.cpp:585:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        serverTimeStr = (char *) malloc(strlen(ATTR_SERVER_TIME)
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:298:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strspn(entry, "+-0123456789") != strlen(entry)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:1251:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t delimLen = strlen( delimitor );
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:1490:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
						int ch2 = fgetc(file);
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2032:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( value, strVal.c_str( ), max_len );
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2045:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*value = (char *) malloc(strlen(strValCStr) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2286:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *value = (char *)malloc(strlen(strVal.c_str()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2312:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *value = (char *)malloc(strlen(strVal.c_str()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2536:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *exprbuf = new char[strlen(str)+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2545:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(exprbuf,str,len);
data/condor-8.6.8~dfsg.1/src/condor_utils/compat_classad.cpp:2767:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffersize = strlen(name) + parsedString.length() +
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_attributes.cpp:64:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmps = (char *) malloc( strlen(local->string) + myDistro->GetLen() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_attributes.cpp:71:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmps = (char *) malloc( strlen(local->string) + myDistro->GetLen() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_attributes.cpp:78:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmps = (char *) malloc( strlen(local->string) + myDistro->GetLen() );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_base64.cpp:73:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int input_length = strlen(input);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_blkng_full_disk_io.cpp:45:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nread = read(fd, ptr, nleft);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_claimid_parser.h:142:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ASSERT(session_info[strlen(session_info)-1] == ']');
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:319:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int cb = (int)strlen(psz);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:445:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int cch = (int)strlen(psz);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1078:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy( magic_prefix, "_" );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1080:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat( magic_prefix, "_" );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:1081:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int prefix_len = (int)strlen( magic_prefix );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:2265:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (tmp == NULL || strlen(tmp) <= 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:3117:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(fd, config, (unsigned int)strlen(config)) != (ssize_t)strlen(config)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:3117:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(fd, config, (unsigned int)strlen(config)) != (ssize_t)strlen(config)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:3172:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(fd, param, (unsigned int)strlen(param)) != (ssize_t)strlen(param)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:3172:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (write(fd, param, (unsigned int)strlen(param)) != (ssize_t)strlen(param)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:3191:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(fd, tmp, (unsigned int)strlen(tmp)) != (ssize_t)strlen(tmp)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_config.cpp:3191:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (write(fd, tmp, (unsigned int)strlen(tmp)) != (ssize_t)strlen(tmp)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_environ.cpp:65:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        tmps = (char *) malloc( strlen(local->string) + myDistro->GetLen() + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_environ.cpp:72:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmps = (char *) malloc( strlen(local->string) + myDistro->GetLen() + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:678:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int cchLine = strlen(sz);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:830:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s[ strlen( s ) - 1 ] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:853:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s[ strlen( s ) - 1 ] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:896:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		submitEventLogNotes = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:905:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		submitEventUserNotes = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:979:11:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	retval = fscanf( file, "    RM-Contact: %8191s\n", s );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:985:11:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	retval = fscanf( file, "    JM-Contact: %8191s\n", s );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1045:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rmContact = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1054:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		jmContact = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1122:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s[ strlen( s ) - 1 ] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1156:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		reason = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1209:11:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	retval = fscanf( file, "    RM-Contact: %8191s\n", s );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1245:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rmContact = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1299:11:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	retval = fscanf( file, "    RM-Contact: %8191s\n", s );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1335:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rmContact = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1405:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(info,str,sizeof(info));
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1531:18:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    int retval = fscanf(
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1653:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(daemon_name,str,sizeof(daemon_name));
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:1661:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(execute_host,str,sizeof(execute_host));
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2350:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(checkpointedstr, "");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2351:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(messagestr, "");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2352:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(terminatestr, "");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2772:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(messagestr, "");
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:2873:12:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		if (4 == sscanf(sz, "\t%f  -  %5s Bytes %8s By %21s", &val, srun, sdir, sjob)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3267:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	message[strlen(message)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3289:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if  (messagestr[strlen(messagestr)-1] == '\n')
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:3290:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			messagestr[strlen(messagestr)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:4313:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf[ strlen( buf ) - 1 ] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:4316:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int label_len = strlen( dagNodeNameLabel );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5180:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		resourceName = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5270:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		resourceName = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5384:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		resourceName = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5393:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		jobId = new char[strlen(mallocstr) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_event.cpp:5898:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ( !skipEventLogNotes || strlen(skipEventLogNotes) == 0 )?0:1;
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_md.cpp:158:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t count = read(fd, buffer, 1024*1024); 
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_md.cpp:162:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		count = read(fd, buffer, 1024*1024); 
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_mkstemp.cpp:67:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t      len = strlen(ptemplate);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_mkstemp.cpp:109:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mode_t savedUmask = umask(S_IRWXG|S_IRWXO);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_mkstemp.cpp:111:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(savedUmask);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netaddr.cpp:87:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char* net_end = net + strlen(net);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:89:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(h_name, name, NI_MAXHOST - 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:308:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(h_name, inet_ntoa(*(in_address_ptr.in)), maxlen - 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:315:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		h_name_len = strlen(h_name);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:391:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(tmp_name, name, idx - name - 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_netdb.cpp:393:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(tmp_name, name, MAXHOSTNAMELEN - 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:48:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(*curr, PIDENVID_PREFIX, strlen(PIDENVID_PREFIX)) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:54:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(*curr) + 1) >= PIDENVID_ENVID_SIZE) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:58:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(penvid->ancestors[i].envid, *curr, PIDENVID_ENVID_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:82:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((strlen(line) + 1) >= PIDENVID_ENVID_SIZE) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:86:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(penvid->ancestors[i].envid, line, PIDENVID_ENVID_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:221:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(to->ancestors[i].envid, from->ancestors[i].envid, PIDENVID_ENVID_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_pidenvid.cpp:248:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t prefix_len = strlen( PIDENVID_PREFIX );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_q.cpp:169:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(owner, value, MAXOWNERLEN - 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_q.cpp:201:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(schedd, value, MAXSCHEDDLEN - 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:601:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned length = strlen( str );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sinful.cpp:653:17:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		int matches = sscanf( open, "[ p=%16s a=%64s port=%d; n=%64s ",
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:409:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( copy, ip_and_port_string, IP_STRING_BUF_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:431:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( copy, ip_and_port_string, IP_STRING_BUF_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:520:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(decorate && int(strlen(buf)) < (len-2)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:521:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buf[strlen(buf)+1] = 0;
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_sockaddr.cpp:522:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buf[strlen(buf)] = ']';
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_ver_info.cpp:255:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while( (ch=fgetc(fp)) != EOF ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_ver_info.cpp:264:35:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			} while ( (i < maxlen) && ((ch=fgetc(fp)) != EOF) );
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_ver_info.cpp:341:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while( (ch=fgetc(fp)) != EOF ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/condor_ver_info.cpp:352:33:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while ( (i < maxlen) && ((ch=fgetc(fp)) != EOF) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:165:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					tmp += strlen(tmp);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:437:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cmdStrLength = strlen(cmdToExecute);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:738:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char * ptr = expanded + strlen(expanded);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:1034:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cchPre = (this->errors || ! preface) ? 0 : strlen(preface)+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2230:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t cch = strlen(end_ptr);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2433:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cch = (int)strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2447:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (cch < 0) cch = (int)strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2540:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (cch < 0) cch = (int)strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2552:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (cch < 0) cch = (int)strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2580:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int cch_cwd = (int)strlen(ctx.cwd);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2758:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2758:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2758:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:2862:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const char * attr = name + strlen(ctxx.adname);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3157:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int cch = (int)strlen(buf);
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3414:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int ixend = (int)strlen(buf); // this will be the end of what we wish to return
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3494:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3494:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3494:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3506:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rval = (char *)MALLOC( (unsigned)(strlen(left) + 1 +
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3507:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
										  strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3560:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SelfOnlyBody only_self(self, (int)strlen(self));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3574:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			only_self.set_self2(selfless, (int)strlen(selfless));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3587:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			only_self.set_self2(selfless, (int)strlen(selfless));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3606:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3606:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/config.cpp:3606:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rval = (char *)MALLOC( (unsigned)(strlen(left) + strlen(tvalue) + strlen(right) + 1));
data/condor-8.6.8~dfsg.1/src/condor_utils/copy_file.cpp:55:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_umask = umask(0);
data/condor-8.6.8~dfsg.1/src/condor_utils/copy_file.cpp:82:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read( in_fd, buff, sizeof(buff) );
data/condor-8.6.8~dfsg.1/src/condor_utils/copy_file.cpp:91:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rc = read( in_fd, buff, sizeof(buff) );
data/condor-8.6.8~dfsg.1/src/condor_utils/copy_file.cpp:103:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask( old_umask );
data/condor-8.6.8~dfsg.1/src/condor_utils/copy_file.cpp:117:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask( old_umask );
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:84:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(username, user, (at-user));
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:87:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(username, user, 255);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:232:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(username, user, (at-user));
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:235:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(username, user, 255);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:303:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(username, user, (at-user));
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:306:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(username, user, 255);
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:345:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   strcpy((trg + strlen(src) - 5), ".cred");
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:348:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   strcpy((trg + strlen(src) - 5), ".cc");
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:351:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   strcpy((trg + strlen(src) - 5), ".mark");
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:402:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(username, user, (at-user));
data/condor-8.6.8~dfsg.1/src/condor_utils/credmon_interface.cpp:405:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(username, user, 255);
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_io.cpp:69:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fulllen += strlen( prefix );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_mgr.cpp:133:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen( param_base ) + strlen( param_ext ) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_mgr.cpp:133:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen( param_base ) + strlen( param_ext ) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_params.cpp:56:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = ( strlen( &m_base ) +
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_params.cpp:60:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 strlen( item ) +
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_params.cpp:66:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat( m_name_buf, "_" );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_job_params.cpp:68:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat( m_name_buf, "_" );
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_param.cpp:37:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned len = ( strlen( &m_base ) +
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_param.cpp:39:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					 strlen( name ) +
data/condor-8.6.8~dfsg.1/src/condor_utils/cron_param.cpp:45:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat( m_name_buf, "_" );
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:37:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:135:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = 10+strlen(host) + strlen(port) + strlen(db) + strlen(dbuser);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:135:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = 10+strlen(host) + strlen(port) + strlen(db) + strlen(dbuser);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:135:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = 10+strlen(host) + strlen(port) + strlen(db) + strlen(dbuser);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:135:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = 10+strlen(host) + strlen(port) + strlen(db) + strlen(dbuser);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:141:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(prefix);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:160:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(passwd, &buf[len], 64);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:165:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (passwd[strlen(passwd)-1] == '\n') {
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:166:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				passwd[strlen(passwd)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:225:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(jobQueueDBIpAddress);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:231:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(host, jobQueueDBIpAddress, 
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:235:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(port, ptr_colon+1, len);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:237:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	port[strlen(ptr_colon+1)] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:247:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp1 = jobQueueDBName?strlen(jobQueueDBName):0;
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:248:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp2 = strlen(writePassword);
data/condor-8.6.8~dfsg.1/src/condor_utils/dbms_utils.cpp:287:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	attValLen = strlen(attVal);
data/condor-8.6.8~dfsg.1/src/condor_utils/directory.WINDOWS.cpp:144:14:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = wcslen ( w_path ) 
data/condor-8.6.8~dfsg.1/src/condor_utils/directory.WINDOWS.cpp:145:14:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           + wcslen ( w_directory ) + 1; /* +1 for \ */
data/condor-8.6.8~dfsg.1/src/condor_utils/directory.WINDOWS.cpp:1966:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy ( directory, path, MAX_PATH );
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:73:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int extra = 2, dirlen = strlen(dirpath);
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:82:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	rval = new char[ extra + dirlen + strlen(filename)];
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:110:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int extra = 3, dirlen = strlen(dirpath), subdirlen = strlen(subdir);
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:110:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int extra = 3, dirlen = strlen(dirpath), subdirlen = strlen(subdir);
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:149:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int size = strlen(path);
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:165:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(dir, path, pos);
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:207:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos = strlen(path);
data/condor-8.6.8~dfsg.1/src/condor_utils/directory_util.cpp:210:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(dirpath, path, pos);
data/condor-8.6.8~dfsg.1/src/condor_utils/distribution.cpp:68:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	distribution_length = strlen(distribution);
data/condor-8.6.8~dfsg.1/src/condor_utils/distribution.cpp:72:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		distribution_cap = distribution_uc + strlen(distribution_uc) +1;
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:320:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int length = strlen( buffer );
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:385:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t end = strlen(buffer);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:474:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(sa.sun_path, "/var/run/docker.sock",sizeof(sa.sun_path) - 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:489:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int ret = write(uds, request, strlen(request));
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:664:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t end = strlen(buffer);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:777:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t end = strlen(buffer);
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:1043:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen( buffer );
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:1095:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(existingImage) > 1) {
data/condor-8.6.8~dfsg.1/src/condor_utils/docker-api.cpp:1096:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	existingImage[strlen(existingImage) - 1] = '\0'; // remove newline
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:837:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	old_umask = umask( 022 );
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:979:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	(void)umask( old_umask );
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:2096:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t ix = strlen(mutex_name);
data/condor-8.6.8~dfsg.1/src/condor_utils/dprintf.cpp:2124:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		filename_len = strlen(filename);
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:181:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(slot_num, tmp+1, 10);
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:501:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cch = wcslen( psz );
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:807:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp(prefix,username,strlen(prefix)) != 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/dynuser.WINDOWS.cpp:952:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (strnicmp( buf, user_prefix, strlen(user_prefix)) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:75:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t prolog_length = strlen(EMAIL_SUBJECT_PROLOG);
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:76:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t subject_length = strlen(subject);
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:280:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		Addresses += strlen(Addresses) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:301:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	prev_umask = umask(022);
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:303:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(prev_umask);
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:434:15:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	prev_umask = umask(022);
data/condor-8.6.8~dfsg.1/src/condor_utils/email.cpp:462:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(prev_umask);
data/condor-8.6.8~dfsg.1/src/condor_utils/email_file.cpp:72:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while( (ch=getc(input)) != EOF ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/email_file.cpp:85:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while( (ch=getc(input)) != EOF ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/email_file.cpp:130:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while( (ch=getc(input)) != EOF ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/email_file.cpp:169:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ch = getc(input);
data/condor-8.6.8~dfsg.1/src/condor_utils/env.cpp:242:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ptr += strlen(ptr) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/env.cpp:438:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	outputlen = strlen(delimitedString)+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/env.cpp:770:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat( array[i], "=" );
data/condor-8.6.8~dfsg.1/src/condor_utils/escapes.cpp:33:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int	 length = strlen( str );
data/condor-8.6.8~dfsg.1/src/condor_utils/executable_scripts.WINDOWS.cpp:289:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				to += strlen ( to );
data/condor-8.6.8~dfsg.1/src/condor_utils/expr_analyze.cpp:1004:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return_buf.append(7+(9-1-strlen(fmt.target_type_name))/2, ' ');
data/condor-8.6.8~dfsg.1/src/condor_utils/expr_analyze.cpp:1392:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (val.IsStringValue(s) && s) { accum += (strlen(s)+1) * sizeof(*s); }
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:254:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mode_t old_umask = umask(0);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:265:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
				umask(old_umask);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:270:4:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
			umask(old_umask);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:274:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(old_umask);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:444:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t ix = strlen(mutex_name);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:471:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		filename_len = strlen(filename);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:722:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		temp_filename = new char[strlen(orig)+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:727:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	temp_filename = new char[strlen(orig)+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:730:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int orig_size = strlen(temp_filename);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:737:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (strlen(hashVal) < 5)
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:738:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sprintf(hashVal+strlen(hashVal), "%lu", hash);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:740:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(path) + strlen(hashVal) + 20;
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:740:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(path) + strlen(hashVal) + 20;
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:752:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(dest+strlen(dest), 3, "%s", hashVal+i);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:753:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(dest+strlen(dest), 2, "%c", DIR_DELIM_CHAR);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_lock.cpp:757:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sprintf(dest+strlen(dest), "%s.lockc", hashVal+4);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:296:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,"NEW ", strlen("NEW "));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:297:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,eventType, strlen(eventType));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:298:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,"\n", strlen("\n"));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:305:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,tempv, strlen(tempv));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:343:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,"UPDATE ", strlen("UPDATE "));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:344:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,eventType, strlen(eventType));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:345:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,"\n", strlen("\n"));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:352:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,tempv, strlen(tempv));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:359:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,tempv, strlen(tempv));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:396:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,"DELETE ", strlen("DELETE "));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:397:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,eventType, strlen(eventType));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:398:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,"\n", strlen("\n"));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_sql.cpp:405:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		retval = write(outfiledes,tempv, strlen(tempv));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:390:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		TmpSpoolSpace = (char*)malloc( strlen(SpoolSpace) + 10 );
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:567:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if(!strncmp(Iwd,Spool,strlen(Spool))) {
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2175:24:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
				mode_t old_umask = umask(0);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2177:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
				umask(old_umask);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2196:19:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
						old_umask = umask(0);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2198:7:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
						umask(old_umask);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:2346:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(daemon, get_mySubSystem()->getName(), 15);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:4204:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(method, URL, (colon-URL));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:4572:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t pathlen = strlen(path);
data/condor-8.6.8~dfsg.1/src/condor_utils/file_transfer.cpp:4757:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if( SpoolSpace && strncmp(fname,SpoolSpace,strlen(SpoolSpace))==0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/file_xml.cpp:149:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmpParamName = (char *)malloc(10+strlen(daemon_name));
data/condor-8.6.8~dfsg.1/src/condor_utils/file_xml.cpp:164:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			outfilename = (char *)malloc(strlen(tmp) + 12);
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:38:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(*method,input,p-input);
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:59:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(*server,p,q-p);
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:108:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(dir,path,(last_slash-path));
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:115:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(dir,".");
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools.cpp:149:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(path) + 20;
data/condor-8.6.8~dfsg.1/src/condor_utils/filename_tools_cpp.cpp:139:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t input_len = strlen(input);
data/condor-8.6.8~dfsg.1/src/condor_utils/filesystem_remap.cpp:613:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			is_shared = is_shared || (strncmp(token, SHARED_STR, strlen(SHARED_STR)) == 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/firewall.WINDOWS.cpp:166:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( _strnicmp(app_basename, "condor_", strlen("condor_")) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/firewall.WINDOWS.cpp:360:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = wcslen(str);
data/condor-8.6.8~dfsg.1/src/condor_utils/firewall.WINDOWS.cpp:421:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int cch = MultiByteToWideChar(CP_ACP, 0, str, (int)strlen(str), NULL, 0);
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_query.cpp:500:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *x = new char [strlen (str) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.cpp:242:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(sz, p, cch);
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.cpp:701:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_OFF(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.cpp:731:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_ON(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.cpp:1425:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if( (flags & this->PubDecorateLoadAttr) && (pattr_len=strlen(pattr)) >= 7 && strcmp(pattr+pattr_len-7,"Seconds")==0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.cpp:1445:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( (pattr_len=strlen(pattr)) >= 7 && strcmp(pattr+pattr_len-7,"Seconds")==0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.h:820:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_OFF(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.h:942:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_ON(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.h:1045:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_OFF(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.h:1120:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_ON(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.h:1305:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_OFF(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_utils/generic_stats.h:1335:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
GCC_DIAG_ON(float-equal)
data/condor-8.6.8~dfsg.1/src/condor_utils/get_daemon_name.cpp:147:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size = strlen(tmpname) + get_local_fqdn().length() + 2; 
data/condor-8.6.8~dfsg.1/src/condor_utils/get_daemon_name.cpp:182:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int size = strlen(name) + get_local_fqdn().length() + 2;
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:126:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(cwd) + strlen(name) + 2;
data/condor-8.6.8~dfsg.1/src/condor_utils/get_exec_path.cpp:126:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(cwd) + strlen(name) + 2;
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:450:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	instr_len = strlen(instr);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:455:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(result, &(instr[1]), instr_len-2);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:514:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	x509_fqan_escape_sub_len = strlen(x509_fqan_escape_sub);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:523:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	x509_fqan_delimiter_sub_len = strlen(x509_fqan_delimiter_sub);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:900:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fqan_len += strlen( tmp_scan_ptr );
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:906:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fqan_len += strlen(x509_fqan_delimiter);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:909:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fqan_len += strlen( tmp_scan_ptr );
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:924:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fqan_len += strlen( tmp_scan_ptr );
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:931:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fqan_len += strlen(x509_fqan_delimiter);
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:935:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fqan_len += strlen( tmp_scan_ptr );
data/condor-8.6.8~dfsg.1/src/condor_utils/globus_utils.cpp:1762:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen( string );
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:323:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:339:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen( s );
data/condor-8.6.8~dfsg.1/src/condor_utils/hibernator.linux.cpp:465:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen( token );
data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp:78:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int cchBaseName = strlen(historyBase);
data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp:79:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int cchBaseFileName = strlen(BaseJobHistoryFileName);
data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp:99:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                cchExtra += strlen(pextra);
data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp:117:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p += cchBaseFileName + strlen(ext) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/historyFileFinder.cpp:154:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    history_base_length = strlen(history_base);
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:84:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int cmd_len = (int)strlen(cmd);
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:89:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(cmd, " ");
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:90:17:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
                strncat(cmd, args, extra_len);
data/condor-8.6.8~dfsg.1/src/condor_utils/history_utils.h:125:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((unsigned int)strlen (buff) > (unsigned int)len) buff[len] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:264:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	expr = (char*)malloc(strlen(ATTR_CLUSTER_ID) + strlen(cid) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:264:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	expr = (char*)malloc(strlen(ATTR_CLUSTER_ID) + strlen(cid) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:274:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	expr = (char*)malloc(strlen(ATTR_PROC_ID) + strlen(pid) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:274:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	expr = (char*)malloc(strlen(ATTR_PROC_ID) + strlen(pid) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:291:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  expr = (char*)malloc(strlen(attr) + strlen(val) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:291:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  expr = (char*)malloc(strlen(attr) + strlen(val) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:371:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(attr) + strlen(val) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/historysnapshot.cpp:371:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(attr) + strlen(val) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:243:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(cn1, he1->h_name, MAXHOSTNAMELEN);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:264:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    skip = strlen(host) - strlen(domain);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:264:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    skip = strlen(host) - strlen(domain);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:297:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(inbuf);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:304:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf, inbuf, 16 );
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:513:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(addrbuf, addr_begin, addr_end - addr_begin);
data/condor-8.6.8~dfsg.1/src/condor_utils/internet.cpp:784:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sprintf(&buf[strlen(buf)], ":%d>", ntohs(port));
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:226:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(attr) + strlen(val) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:226:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(attr) + strlen(val) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:243:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(temp) + strlen(val) + 6);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:243:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(temp) + strlen(val) + 6);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:343:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if (strlen(curProcId) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:344:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(curProcId, pid, 19);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:352:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(curProcId, pid, 19);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:386:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(attr) + strlen(val) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:386:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(attr) + strlen(val) + 4);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:404:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(attr) + strlen(val) + 6);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:404:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* expr = (char*)malloc(strlen(attr) + strlen(val) + 6);
data/condor-8.6.8~dfsg.1/src/condor_utils/jobqueuesnapshot.cpp:417:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  (char *) malloc(strlen(ATTR_SERVER_TIME)
data/condor-8.6.8~dfsg.1/src/condor_utils/log.cpp:93:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ch = fgetc( fp );
data/condor-8.6.8~dfsg.1/src/condor_utils/log.cpp:112:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ch = fgetc( fp );
data/condor-8.6.8~dfsg.1/src/condor_utils/log.cpp:144:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ch = fgetc( fp );
data/condor-8.6.8~dfsg.1/src/condor_utils/log.cpp:162:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ch = fgetc( fp );
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:108:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			entrysize=sizeof(struct dirent)-sizeof(entry->d_name)+strlen(entry->d_name)+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:158:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		searchLogName = (char *)malloc(strlen(logBaseName)+3);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:196:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *rotated_log_name = (char*)malloc(strlen(logBaseName) + strlen(ts) + 2) ;
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:196:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *rotated_log_name = (char*)malloc(strlen(logBaseName) + strlen(ts) + 2) ;
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:258:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:279:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int dirLen = strlen(baseDirName);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:285:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int fLen = strlen(logBaseName);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:287:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    	if (  (strlen(filename) > unsigned(fLen-dirLen)) && 
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:318:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(oldFile);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:319:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *result = (char*)malloc(len+1 + strlen(dirName) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:336:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int cchBase = strlen(logBaseName);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:355:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			oldFile = (char*)malloc(strlen(logBaseName) + 2 + MAX_ISO_TIMESTAMP);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_rotate.cpp:359:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int cch = strlen(ffd.cFileName);
data/condor-8.6.8~dfsg.1/src/condor_utils/log_transaction.cpp:160:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strncasecmp("NONE", filter, strlen("NONE")) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/log_transaction.cpp:165:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(strncasecmp("ALL", filter, strlen("ALL")) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/log_transaction.cpp:167:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  } else if(strncasecmp("FAILED", filter, strlen("FAILED")) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:114:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( !Login || 0 == wcslen(Login) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:117:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	}else if ( !Passwd || 0 == wcslen(Passwd) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:122:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int new_buffer_len = 	wcslen(Login) + 1 + // Login delimiter
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:123:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							wcslen(Passwd) + 3;  // newline + null terminator
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:136:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		new_buffer_len += wcslen(this->Data_string);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:147:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_buffer[wcslen(new_buffer)+1] = L'\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:148:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_buffer[wcslen(new_buffer)] = CC_DATA_DELIM;
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:151:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_buffer[wcslen(new_buffer)+1] = L'\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:152:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_buffer[wcslen(new_buffer)] = CC_RECORD_DELIM;
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:167:39:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ZeroMemory(new_buffer, sizeof(WCHAR)*wcslen(new_buffer));
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:196:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			newData = new wchar_t[(wcslen(Data_string) - remove_len) +1];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:199:4:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			wcsncpy(newData, Data_string, (result - Data_string) ); 
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:231:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ZeroMemory(pw, wcslen(pw));
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:247:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int query_str_size = wcslen(Login) + 2; // delimiter+null
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:256:4:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			wcsncpy(pw, result, pwlen);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:268:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	LPWSTR str_unicode = new wchar_t[strlen(str)+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:269:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	MultiByteToWideChar(CP_ACP, 0, str, -1, str_unicode, strlen(str)+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:459:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	StringLength = wcslen(String);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:471:3:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		wcsncpy( Data_string, DataBuffer->Buffer, strlength );
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:481:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int look_for_size = wcslen(Login) + 3; // delimiter+delimiter+null
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:491:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	look_for[wcslen(look_for)+1] = L'\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:492:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	look_for[wcslen(look_for)] = CC_DATA_DELIM;
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:513:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		h_lwr = new wchar_t[wcslen(haystack)+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:514:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		n_lwr = new wchar_t[wcslen(needle)+1];
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:572:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SecureZeroMemory(Passw, sizeof(WCHAR)*wcslen(Passw)+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:576:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SecureZeroMemory(Login, sizeof(WCHAR)*wcslen(Login)+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:604:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ZeroMemory(Login, sizeof(WCHAR)*wcslen(Login)+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:630:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		SecureZeroMemory(pszPassw, sizeof(WCHAR)*wcslen(pszPassw));
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:654:35:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ZeroMemory(Passw, sizeof(WCHAR)*wcslen(Passw));
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.cpp:659:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ZeroMemory(Login, sizeof(WCHAR)*wcslen(Login)+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.h:107:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if ( wcslen(Data_string) > 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/lsa_mgr.h:108:50:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					SecureZeroMemory(Data_string, sizeof(WCHAR)*wcslen(Data_string));
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:288:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
								size_t cch = strlen(pszz);
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:292:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									pszz += cch+1; cch = strlen(pszz);
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:391:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (width_from_label) { wid = 0 - (int)strlen(lbl); }
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:576:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		hwid = strlen(phead);
data/condor-8.6.8~dfsg.1/src/condor_utils/make_printmask.cpp:614:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (phead && (fmt->width == (int)strlen(phead))) {
data/condor-8.6.8~dfsg.1/src/condor_utils/match_prefix.cpp:26:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t	s1l = strlen(s1);
data/condor-8.6.8~dfsg.1/src/condor_utils/match_prefix.cpp:27:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t	s2l = strlen(s2);
data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.cpp:66:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		chunksize = ::read(fd,cbuffer,COMPARE_BUFFER_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.cpp:129:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ssize_t memory_file::read( char *data, size_t length )
data/condor-8.6.8~dfsg.1/src/condor_utils/memory_file.h:53:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ssize_t	read( char *data, size_t length );
data/condor-8.6.8~dfsg.1/src/condor_utils/my_getopt.cpp:214:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if((strlen(longopts[ind].name) == (size_t) (charind - offset)) &&
data/condor-8.6.8~dfsg.1/src/condor_utils/my_hostname.cpp:289:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t attr_name_len = strlen(attr_name);
data/condor-8.6.8~dfsg.1/src/condor_utils/my_hostname.cpp:389:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t string_start_pos = delimpos + strlen( delimiter );
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:412:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(write_data) > 2048) {
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:631:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (write(pipe_writedata[WRITE_END],write_data,strlen(write_data)) < 0) {} // we don't care about return 
data/condor-8.6.8~dfsg.1/src/condor_utils/my_popen.cpp:1116:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int cbOld = append ? strlen(old) : 0;
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.WINDOWS.cpp:60:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy ( _ip_address, my_ip_string (), IP_STRING_BUF_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.WINDOWS.cpp:67:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy ( _ip_address, ip_addr.to_ip_string().Value(), IP_STRING_BUF_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.WINDOWS.cpp:73:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy ( _description, description,
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.WINDOWS.cpp:157:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                    strncpy (
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.WINDOWS.cpp:187:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                    strncpy (
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.cpp:171:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf, s.Value(), bufsize );
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.cpp:200:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( ifr.ifr_name, name, IFNAMSIZ );
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.cpp:219:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += strlen(tmp);
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.cpp:225:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat( str, ":" );
data/condor-8.6.8~dfsg.1/src/condor_utils/network_adapter.unix.cpp:255:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( m_netmask_str,
data/condor-8.6.8~dfsg.1/src/condor_utils/param_info.cpp:645:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
		strncat(*range_start, c1, c3-c1+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/param_info.cpp:652:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
		strncat(*range_end, c2, c3-c2+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/param_info.cpp:795:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	subject_len = strlen(subject);
data/condor-8.6.8~dfsg.1/src/condor_utils/param_info_help.cpp:40:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				p += strlen(p)+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/param_info_help.cpp:42:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				p += strlen(p)+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:68:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int i = (int)strlen( file_name ) - 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:76:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(new_file_name, file_name, i);
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:340:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char* DCname = new char[ wcslen( DomainController )+1 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:520:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Account_name = new char[ strlen(accountname) +1 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:525:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		Domain_name = new char[ strlen(domain) +1 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:542:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(qualified_account, accountname, 1024);
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:701:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len_to_copy = (int)strlen(filename);
data/condor-8.6.8~dfsg.1/src/condor_utils/perm.WINDOWS.cpp:930:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(qualified_name, Account_name, 1023);
data/condor-8.6.8~dfsg.1/src/condor_utils/pgsqldatabase.cpp:53:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		con_str = (char*)malloc(strlen(connect) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/pgsqldatabase.cpp:886:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int result = ::PQputCopyData(connection, buffer, strlen(buffer));
data/condor-8.6.8~dfsg.1/src/condor_utils/print_wrapped_text.cpp:39:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		token_length = (int)strlen(token);
data/condor-8.6.8~dfsg.1/src/condor_utils/profile.WINDOWS.cpp:709:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ( tmp && strlen ( tmp ) > 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/profile.WINDOWS.cpp:714:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            w_penv += wcslen ( w_penv ) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/profile.WINDOWS.cpp:875:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen ( profile_cache_ ) 
data/condor-8.6.8~dfsg.1/src/condor_utils/profile.WINDOWS.cpp:876:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            + strlen ( user_name_ ) + 1
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log.cpp:696:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			nextchar = fgetc(m_fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log.cpp:698:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				nextchar = fgetc(m_fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log.cpp:710:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				nextchar = fgetc(m_fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log.cpp:716:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			nextchar = fgetc(m_fp);
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.cpp:83:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( 0 == strlen(m_ro_state->internal.m_base_path) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.cpp:145:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf, m_ro_state->internal.m_uniq_id, len );
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.cpp:165:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( istate->m_signature,
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.cpp:666:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( !strlen( istate->m_base_path ) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.cpp:669:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( istate->m_base_path,
data/condor-8.6.8~dfsg.1/src/condor_utils/read_user_log_state.cpp:683:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( istate->m_uniq_id,
data/condor-8.6.8~dfsg.1/src/condor_utils/secure_file.cpp:47:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t password_len = strlen(password);
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:70:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = new char[strlen(key) + strlen(value) + 2];
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:70:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = new char[strlen(key) + strlen(value) + 2];
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:123:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int valuelen = strlen(env_var) - namelen - 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:127:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy ( name, env_var, namelen );
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:128:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy ( value, equalpos+1, valuelen );
data/condor-8.6.8~dfsg.1/src/condor_utils/setenv.cpp:154:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( strncmp( my_environ[i], env_var, strlen(env_var) ) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/simple_arg.cpp:49:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if ( strlen(m_arg) == 2) {
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:87:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  (char *) soap_malloc(s, strlen(GetMyTypeName(*curr_ad)) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:97:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  (char *) soap_malloc(s, strlen(GetTargetTypeName(*curr_ad)) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:109:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  (char *) soap_malloc(s, strlen(timeString.Value()) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:147:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(char *) soap_malloc(s, strlen(str) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:179:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int buflen = strlen( ExprTreeToString( tree ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/soap_helpers.cpp:198:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			soap_malloc(s, strlen(name) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/socket_proxy.cpp:140:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				int n = read(it->from_socket,it->buf,SOCKET_PROXY_BUFSIZE);
data/condor-8.6.8~dfsg.1/src/condor_utils/spooled_job_files.cpp:41:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buflen = (directory ? strlen(directory) : 0) + 80;
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:60:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	privKeyFile[strlen(privKeyFile) - 4] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:62:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hostKeyFile = (char *)malloc(strlen(privKeyFile) + strlen("-host") + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:62:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hostKeyFile = (char *)malloc(strlen(privKeyFile) + strlen("-host") + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:90:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *command = (char *)malloc(strlen(keygen) + strlen(args) + strlen(privateKey) + 80);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:90:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *command = (char *)malloc(strlen(keygen) + strlen(args) + strlen(privateKey) + 80);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:90:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *command = (char *)malloc(strlen(keygen) + strlen(args) + strlen(privateKey) + 80);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:168:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fwrite(keystring, strlen(keystring), 1, f);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:196:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *buf = (char *) malloc(256 + strlen(pubKeyFile) + strlen(hostKeyFile) + strlen(rawArgs));
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:196:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *buf = (char *) malloc(256 + strlen(pubKeyFile) + strlen(hostKeyFile) + strlen(rawArgs));
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:196:79:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *buf = (char *) malloc(256 + strlen(pubKeyFile) + strlen(hostKeyFile) + strlen(rawArgs));
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:303:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *buf = (char *) malloc(7 + strlen(sinful) + 1 + strlen(username) + 1 
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:303:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *buf = (char *) malloc(7 + strlen(sinful) + 1 + strlen(username) + 1 
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:304:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
								+ strlen(dir) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/sshd_wrapper.dead.cpp:312:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p[strlen(p) - 1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/stat_info.cpp:278:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int dirlen = (int)strlen(dir);
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:339:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( strlen( tokenBuf ) > 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:349:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( !delim || strlen(delim) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/stl_string_utils.cpp:366:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( skipBlankTokens && result && strlen(result) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:63:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(username, user, (at-user));
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:227:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (( (size_t)(at - user) != strlen(POOL_PASSWORD_USERNAME)) ||
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:251:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t cred_sz = strlen(cred);
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:344:25:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SecureZeroMemory(w_pw, wcslen(w_pw)*sizeof(wchar_t));
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:410:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				SecureZeroMemory(pw_wc, wcslen(pw_wc));
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:440:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					SecureZeroMemory(pw_wc, wcslen(pw_wc));
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:527:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		SecureZeroMemory(pw,strlen(pw));
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:647:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SecureZeroMemory(password,strlen(password));
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:740:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			    (tmp - user == strlen(POOL_PASSWORD_USERNAME)) &&
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:748:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					pwlen = strlen(pw)+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:779:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		SecureZeroMemory(pw, strlen(pw));
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:952:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t pwlen = strlen(pw)+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:954:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		SecureZeroMemory(pw, strlen(pw));
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:1004:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pwlen=strlen(pw)+1;
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:1018:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    ( (size_t)(tmp - user) == strlen(POOL_PASSWORD_USERNAME)) &&
data/condor-8.6.8~dfsg.1/src/condor_utils/store_cred.cpp:1184:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ch = getchar();
data/condor-8.6.8~dfsg.1/src/condor_utils/strcasestr.cpp:28:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t n = strlen( pattern );
data/condor-8.6.8~dfsg.1/src/condor_utils/string_conversion.WINDOWS.cpp:29:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t n = strlen ( as ) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/string_conversion.WINDOWS.cpp:41:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t n = wcslen ( ws ) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:135:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy (tmp_string, begin_ptr, len);
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:171:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(tmp_string, p, len);
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:320:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(x);
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:417:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					temp = strncasecmp(x,string,strlen(x));
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:419:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					temp = strncmp(x,string,strlen(x));
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:446:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				temp = strncasecmp(matchstart,string,strlen(matchstart));
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:448:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				temp = strncmp(matchstart,string,strlen(matchstart));
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:454:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t len = strlen(string);
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:455:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t matchendlen = strlen(matchend);
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:566:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += ( strlen(tmp) + strlen(delim) );
data/condor-8.6.8~dfsg.1/src/condor_utils/string_list.cpp:566:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += ( strlen(tmp) + strlen(delim) );
data/condor-8.6.8~dfsg.1/src/condor_utils/strnewp.cpp:27:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *newstr = new char[ strlen( str ) + 1 ];
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_glob.cpp:168:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cch = strlen(filename);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_glob.cpp:374:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t cch = strlen(wfd.cFileName);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_glob.cpp:381:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(item, pattern, cchdir+1);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_glob.cpp:383:17:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
			if (cchmark) strcpy(item+cchdir+cch, "/");
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:387:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * pe = p + strlen(p);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:481:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(my_name, tmp, sizeof(my_name));
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:1269:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int namelen = (int)strlen(name);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:3361:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unsigned int prefixLength = (unsigned int)strlen( SUBMIT_KEY_EC2ParamPrefix );
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:3423:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int prefix_len = (int)strlen(ATTR_EC2_TAG_PREFIX);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:4289:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int REMOTE_PREFIX_LEN = (int)strlen(SUBMIT_KEY_REMOTE_PREFIX);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:5262:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char * rname = key + strlen(SUBMIT_KEY_RequestPrefix);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:5307:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(orig) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:5551:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const char * rname = key + strlen(SUBMIT_KEY_RequestPrefix);
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:6909:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if(*macro_value != '"' || macro_value[1] == '\0' || macro_value[strlen(macro_value)-1] != '"') {
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:6914:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		macro_value[strlen(macro_value)-1] = '\0';  //get rid of terminal quote
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7167:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(LiveNodeString,"");
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7389:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, sz, cch); buf[cch-1] = 0;
data/condor-8.6.8~dfsg.1/src/condor_utils/submit_utils.cpp:7554:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int cch = (int)strlen(plist);
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:81:14:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ULONG len = wcslen(strW) + 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:144:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( strnicmp( lpDeviceName, lpDeviceFileName, strlen( lpDeviceName ) ) == 0 )
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:147:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				fsFileName += (LPCTSTR)( lpDeviceFileName + strlen( lpDeviceName ) );
data/condor-8.6.8~dfsg.1/src/condor_utils/system_info.WINDOWS.cpp:167:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( lpDrive, lpFsFileName, 2 );
data/condor-8.6.8~dfsg.1/src/condor_utils/test.cpp:122:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep( usec );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:85:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* foo = new char[strlen(str) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:86:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(foo, str, strlen(str) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:86:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncpy(foo, str, strlen(str) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:93:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* foo = new char[strlen(str) + 1];
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:94:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(foo, str, strlen(str) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:94:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncpy(foo, str, strlen(str) + 1);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:258:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(exprString, buf.c_str(),buf.size() + 1 ); 
data/condor-8.6.8~dfsg.1/src/condor_utils/test_classad_put.cpp:283:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        serverTimeStr = (char *) malloc(strlen(ATTR_SERVER_TIME)
data/condor-8.6.8~dfsg.1/src/condor_utils/test_compat_classad.cpp:465:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(tmpValue, "");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_compat_classad.cpp:478:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(tmpValue, "");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_compat_classad.cpp:492:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(tmpValue, "");
data/condor-8.6.8~dfsg.1/src/condor_utils/test_hibernation.cpp:112:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( !tmp || !strlen(tmp) ) tmp = "<NONE>";
data/condor-8.6.8~dfsg.1/src/condor_utils/test_hibernation.cpp:116:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( !tmp || !strlen(tmp) ) tmp = "<NONE>";
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp:386:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if ( read( fd, state.buf, state.size ) != state.size ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp:610:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					int		 l = strlen( info );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp:745:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( tbuf, asctime( &t ), sizeof(tbuf) );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp:747:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strlen(tbuf) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader.cpp:748:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tbuf[strlen(tbuf)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:341:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ( read( fd, state.buf, state.size ) != state.size ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:785:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf, ctime(&t), bufsize );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:798:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf, asctime( &t ), bufsize );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:806:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen( buf );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_reader_state.cpp:947:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( 1 == strlen(s) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:44:10:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
# define usleep(_x_) Sleep((_x_)/1000)
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1083:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, pw->pw_name, sizeof(buf) );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1279:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep( m_options.getSleepUseconds() );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1333:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( tbuf, ctime( &now ), sizeof(tbuf) );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1335:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strlen(tbuf) ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1336:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tbuf[strlen(tbuf)-1] = '\0';
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1583:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
	strncat(e->message,"EXCEPTION", 15);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_log_writer.cpp:1636:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(e->info, m_options.m_genericEventStr, sizeof(e->info) );
data/condor-8.6.8~dfsg.1/src/condor_utils/test_network_adapter.cpp:98:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( !tmp || !strlen(tmp) ) tmp = "<NONE>";
data/condor-8.6.8~dfsg.1/src/condor_utils/test_network_adapter.cpp:102:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( !tmp || !strlen(tmp) ) tmp = "<NONE>";
data/condor-8.6.8~dfsg.1/src/condor_utils/test_old_classads.cpp:4330:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(s);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:40:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(output) == num_chars) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:45:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   "%d characters!\n", strlen(output), num_chars);
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:48:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (reported_length == strlen(input)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:53:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				   reported_length, strlen(input));
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:59:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(output) == 0) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:63:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   strlen(output));
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:66:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (reported_length == strlen(input)) {
data/condor-8.6.8~dfsg.1/src/condor_utils/test_snprintf.cpp:71:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   reported_length, strlen(input));
data/condor-8.6.8~dfsg.1/src/condor_utils/tokener.h:40:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bool starts_with(const char * pat) const { size_t cpat = strlen(pat); return cpat <= cch && line.substr(ix_cur, cpat) == pat; }
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.cpp:61:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy ( m_mac, mac, STRING_MAC_ADDRESS_LENGTH-1 );
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.cpp:63:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy ( m_subnet, subnet, MAX_IP_ADDRESS_LENGTH-1 );
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.cpp:65:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy ( m_public_ip, my_ip_string (), MAX_IP_ADDRESS_LENGTH-1 );
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.cpp:110:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( m_public_ip, sinful.getHost(), MAX_IP_ADDRESS_LENGTH-1);
data/condor-8.6.8~dfsg.1/src/condor_utils/udp_waker.cpp:219:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( c != 6 || strlen ( m_mac ) < STRING_MAC_ADDRESS_LENGTH - 1 ) {
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:480:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			SecureZeroMemory(w_pw, wcslen(w_pw)*sizeof(wchar_t));
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:778:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(szAccountName) + strlen(szDomainName) + 4;
data/condor-8.6.8~dfsg.1/src/condor_utils/uids.cpp:778:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(szAccountName) + strlen(szDomainName) + 4;
data/condor-8.6.8~dfsg.1/src/condor_utils/user_log_header.cpp:81:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( buf, generic->info, sizeof(buf)-1 );
data/condor-8.6.8~dfsg.1/src/condor_utils/user_log_header.cpp:83:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int size = strlen( buf );
data/condor-8.6.8~dfsg.1/src/condor_utils/user_log_header.cpp:97:10:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	int n = sscanf( generic->info,
data/condor-8.6.8~dfsg.1/src/condor_utils/vm_univ_utils.cpp:53:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr = tmpvalue + strlen(tmpvalue) - 1;
data/condor-8.6.8~dfsg.1/src/condor_utils/vm_univ_utils.cpp:173:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ext_length = strlen(suffix);
data/condor-8.6.8~dfsg.1/src/condor_utils/vm_univ_utils.cpp:174:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	file_length = strlen(filename);
data/condor-8.6.8~dfsg.1/src/condor_utils/write_user_log.cpp:375:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(m_global_path) + 6;
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:559:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * pe = p + strlen(p);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:644:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t cchKey = strlen(keyword);
data/condor-8.6.8~dfsg.1/src/condor_utils/xform_utils.cpp:957:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char * pe = p + strlen(p);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vm_type.cpp:435:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( !strncasecmp( name, "JobVM", strlen("JobVM") ) ||
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vm_type.cpp:436:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			!strncasecmp( name, "VMPARAM", strlen("VMPARAM") )) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp.cpp:78:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int bytes = read(0, buf, FORWARD_BUFFER_SIZE);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp:72:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len=strlen(raw);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_common.cpp:282:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(i=0;i<strlen(s);i++) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmgahp_main.cpp:319:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			opt_len = strlen(opt);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:82:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, descbuffer, VMWARE_MONOLITHICSPARSE_VMDK_DESCRIPTOR_SIZE );
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:102:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namestartpos += strlen(VMWARE_SNAPSHOT_PARENTFILE_HINT);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:223:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		total_read += strlen(linebuf);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:495:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( !strncasecmp(name.Value(), "scsi", strlen("scsi")) ||
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:496:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				!strncasecmp(name.Value(), "ide", strlen("ide"))) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:568:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int config_length = strlen(VMWARE_TMP_TEMPLATE) + 
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:569:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(VMWARE_TMP_CONFIG_SUFFIX); // vmXXXXX_condor.vmx
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:575:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		file_length = strlen(tmp_base);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:622:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		                 strlen(VMWARE_LOCAL_SETTINGS_START_MARKER)) )
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:629:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		                 strlen(VMWARE_LOCAL_SETTINGS_END_MARKER)) )
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:642:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen("ethernet0.connectionType")) ) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:724:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cp = strlen(pre);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:728:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cs = strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:742:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cp = strlen(pre);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:746:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cs = strlen(str);
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:863:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if( strncasecmp(line, devn, strlen(devn)) == 0 ) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:879:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( !strncasecmp(line, "config.", strlen("config.")) ||
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:880:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				!strncasecmp(line, "virtualHW.", strlen("virtualHW.")) ||
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:881:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				!strncasecmp(line, "guestOS", strlen("guestOS"))) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:883:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		}else if( !strncasecmp(line, "scsi", strlen("scsi")) ||
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:884:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				!strncasecmp(line, "ide", strlen("ide"))) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:969:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if( !strncasecmp(line, "ethernet0.virtualDev", strlen("ethernet0.virtualDev")) ) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:971:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if( !strncasecmp(line, "floppy", strlen("floppy")) ) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:973:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if( !strncasecmp(line, "parallel", strlen("parallel")) ) {
data/condor-8.6.8~dfsg.1/src/condor_vm-gahp/vmware_type.cpp:975:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if( !strncasecmp(line, "serial", strlen("serial")) ) {
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:262:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cch2 = p2 ? strlen(p2) : 0;
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:266:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t cch1 = p1 ? strlen(p1) : 0;
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:317:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int wid = (int)(width ? width : strlen(heading));
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:345:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(outstr, name.c_str()+4, cch-1);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:385:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (line && (0 == strlen(line))) line = getline_trim(stream);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:386:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( ! line || (0 == strlen(line)))
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:623:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (line && ! strlen(line)) line = getline_trim(stream);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1008:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int wid = width ? width : (int)strlen(heading);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1190:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						wid = 0 - (int)strlen(hd);
data/condor-8.6.8~dfsg.1/src/condor_who/who.cpp:1780:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int cbRead = read(fd, buf, sizeof(buf));
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:299:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( input && strlen(input)) {
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:334:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	output_line = (char *)malloc(strlen(input_line) + i + 200);
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:1924:116:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(int i=0;input_line[i];i++){fprintf(stderr,"input_line[%d]=\"%s\" (len=%lu)\n",i,input_line[i],(unsigned long)strlen(input_line[i]));}
data/condor-8.6.8~dfsg.1/src/cream_gahp/cream_gahp_server.cpp:2153:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		result = read(0, &(buf[ibuf]), 1 );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/PipeBuffer_no_dc.cpp:55:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			readBufferSize = read( pipe_end, readBuffer, PIPE_BUFFER_READAHEAD_SIZE );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/PipeBuffer_no_dc.cpp:83:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( & buffer[ copyToIndex ], & readBuffer[ copyFromIndex ], amount );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/PipeBuffer_no_dc.cpp:90:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( &buffer[ copyToIndex ], & readBuffer[ copyFromIndex ], amount );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/PipeBuffer_no_dc.cpp:106:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( & buffer[ copyToIndex ], & readBuffer[ copyFromIndex ], amount );
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:1668:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        for( ; * read != '\0'; ++read ) {
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:1668:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        for( ; * read != '\0'; ++read ) {
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazonCommands.cpp:1669:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            char tmp = * read;
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:42:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( !strncasecmp("http://", url, strlen("http://"))) {
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:43:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		amazon_proxy_host = url +  strlen("http://");
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:45:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	}else if( !strncasecmp("https://", url, strlen("https://")) ) { 
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:46:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		amazon_proxy_host = url +  strlen("https://");
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:192:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len=strlen(raw);
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:289:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i=0; i<strlen(s); i++) {
data/condor-8.6.8~dfsg.1/src/ec2_gahp/amazongahp_common.cpp:305:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen(s) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/ec2_gahp/queryAPI-sim.cpp:849:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        bytesRead = read( sockfd, (void *) buffer, 1024 );
data/condor-8.6.8~dfsg.1/src/gangliad/gangliad.cpp:90:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				size_t l = strlen(fname);
data/condor-8.6.8~dfsg.1/src/gangliad/statsd.cpp:670:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	F.read(&contents[0], contents.size());
data/condor-8.6.8~dfsg.1/src/gce_gahp/PipeBuffer.cpp:56:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		readahead_length = read(pipe_end, readahead_buffer, PIPE_BUFFER_READAHEAD_SIZE);
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:42:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( !strncasecmp("http://", url, strlen("http://"))) {
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:43:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		gce_proxy_host = url +  strlen("http://");
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:45:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	}else if( !strncasecmp("https://", url, strlen("https://")) ) {
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:46:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		gce_proxy_host = url +  strlen("https://");
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:192:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len=strlen(raw);
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:289:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i=0; i<strlen(s); i++) {
data/condor-8.6.8~dfsg.1/src/gce_gahp/gcegahp_common.cpp:305:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strlen(s) <= 0 ) {
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:347:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(input_line);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:368:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( input && strlen(input)) {
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:407:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	output_line = (char *)malloc(strlen(input_line) + i + 200);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1124:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat( output, " " );
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1126:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat( output, "=" );
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1162:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	saved_req_id = (char *) malloc(strlen(req_id) + 1);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1321:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		environ_variable = (char *) malloc(strlen(file_name) + 1);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1551:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	result = strlen(file_name);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1559:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	import_buf.length = strlen(buf_value) + 1;  /* add 1 for the null */
data/condor-8.6.8~dfsg.1/src/gt2_gahp/gahp_server.cpp:1680:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		result = read(stdin_fd, &(buf[ibuf]), 1 );
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:521:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       parsed_url.url_path == GLOBUS_NULL || strlen(parsed_url.url_path) == 0U)
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:664:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            amt = read(rc, buf, 1024);
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:858:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(inpath) >= 2U)
data/condor-8.6.8~dfsg.1/src/gt2_gahp/my_ez.cpp:875:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *outpath = (char *) globus_malloc(strlen(inpath)+1);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:382:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int src_len = strlen( src );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:469:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( input && strlen(input)) {
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:508:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	output_line = (char*) malloc(strlen(input_line) + i + 200);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:541:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	output_line = (char *) malloc(strlen(input_line) + i + 200);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:847:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char *output = (char *) malloc( 10 + strlen( input_line[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:848:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
														strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:968:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
												   strlen( user_arg->cmd[3] ),
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1034:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1035:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( (char *) user_arg->buff ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1041:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1042:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1173:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1174:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( (char *) user_arg->buff ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1180:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1181:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1251:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1256:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1257:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1399:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1406:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1407:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1454:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read( user_arg->fd, buffer, TRANSFER_BUFFER_SIZE );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1639:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1646:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1647:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1899:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			output = (char *) malloc( 16 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1900:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
										 strlen( err_str ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1943:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			output = (char *)malloc( 16 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1944:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
										 strlen( err_str ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1957:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 40 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1958:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( wallclock ) + strlen( sys_cpu ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1958:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( wallclock ) + strlen( sys_cpu ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1959:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( user_cpu ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1968:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 16 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:1969:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2040:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2045:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2046:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2197:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2198:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2229:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen( url.host ) + 10;
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2242:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen( url.host ) + 10;
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2390:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = read( user_arg->fd, buffer, TRANSFER_BUFFER_SIZE );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2479:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2484:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		output = (char *) malloc( 10 + strlen( user_arg->cmd[1] ) +
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2485:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									 strlen( esc ) );
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2829:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	result = strlen(file_name);
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2837:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	import_buf.length = strlen(buf_value) + 1;  /* add 1 for the null */
data/condor-8.6.8~dfsg.1/src/nordugrid_gahp/nordugrid_gahp.c:2975:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		result = read(stdin_fd, &(buf[ibuf]), 1 );
data/condor-8.6.8~dfsg.1/src/pandad/PipeBuffer.cpp:9:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bytesReadAhead = read( fd, (void *)readAheadBuffer, readAheadSize );
data/condor-8.6.8~dfsg.1/src/pandad/pandadClassAdLogPlugin.cpp:254:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( hostname == NULL || strlen( hostname ) == 0 ) {
data/condor-8.6.8~dfsg.1/src/pandad/pandadClassAdLogPlugin.cpp:258:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( hostname == NULL || strlen( hostname ) == 0 ) {
data/condor-8.6.8~dfsg.1/src/pandad/pandadClassAdLogPlugin.cpp:262:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( hostname == NULL || strlen( hostname ) == 0 ) {
data/condor-8.6.8~dfsg.1/src/python-bindings/inotify_sentry.h:62:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                size = read(m_fd, reinterpret_cast<char *>(&event)+count, INOTIFY_BUFSIZE-count);
data/condor-8.6.8~dfsg.1/src/safefile/safe_fopen.c:390:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    new_flags = malloc(strlen(flags) + 1);
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:551:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		stack->stack[stack->count - 1].cur_position += strlen(cur_path);
data/condor-8.6.8~dfsg.1/src/safefile/safe_is_path_trusted.c:986:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    ssize_t bytes_read = read(fd[0], buf, (size_t)bytes_to_read);

ANALYSIS SUMMARY:

Hits = 7016
Lines analyzed = 1018278 in approximately 33.40 seconds (30487 lines/second)
Physical Source Lines of Code (SLOC) = 669961
Hits@level = [0] 7773 [1] 1778 [2] 3168 [3] 200 [4] 1815 [5]  55
Hits@level+ = [0+] 14789 [1+] 7016 [2+] 5238 [3+] 2070 [4+] 1870 [5+]  55
Hits/KSLOC@level+ = [0+] 22.0744 [1+] 10.4723 [2+] 7.81837 [3+] 3.08973 [4+] 2.79121 [5+] 0.0820943
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.