Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/cups-filters-1.28.5/utils/cups-browsed.c
Examining data/cups-filters-1.28.5/utils/driverless.c
Examining data/cups-filters-1.28.5/fontembed/embed_sfnt_int.h
Examining data/cups-filters-1.28.5/fontembed/test_ps.c
Examining data/cups-filters-1.28.5/fontembed/fontfile.h
Examining data/cups-filters-1.28.5/fontembed/sfnt.c
Examining data/cups-filters-1.28.5/fontembed/dynstring.h
Examining data/cups-filters-1.28.5/fontembed/embed_sfnt.c
Examining data/cups-filters-1.28.5/fontembed/embed_pdf.h
Examining data/cups-filters-1.28.5/fontembed/dynstring.c
Examining data/cups-filters-1.28.5/fontembed/iofn.h
Examining data/cups-filters-1.28.5/fontembed/bitset.h
Examining data/cups-filters-1.28.5/fontembed/sfnt_subset.c
Examining data/cups-filters-1.28.5/fontembed/frequent.h
Examining data/cups-filters-1.28.5/fontembed/fontfile.c
Examining data/cups-filters-1.28.5/fontembed/embed.h
Examining data/cups-filters-1.28.5/fontembed/embed_pdf_int.h
Examining data/cups-filters-1.28.5/fontembed/main.c
Examining data/cups-filters-1.28.5/fontembed/sfnt.h
Examining data/cups-filters-1.28.5/fontembed/frequent.c
Examining data/cups-filters-1.28.5/fontembed/embed_pdf.c
Examining data/cups-filters-1.28.5/fontembed/embed.c
Examining data/cups-filters-1.28.5/fontembed/aglfn13.c
Examining data/cups-filters-1.28.5/fontembed/test_analyze.c
Examining data/cups-filters-1.28.5/fontembed/test_pdf.c
Examining data/cups-filters-1.28.5/fontembed/sfnt_int.h
Examining data/cups-filters-1.28.5/fontembed/macroman.h
Examining data/cups-filters-1.28.5/scripting/php/phpcups.c
Examining data/cups-filters-1.28.5/scripting/php/phpcups.h
Examining data/cups-filters-1.28.5/backend/serial.c
Examining data/cups-filters-1.28.5/backend/implicitclass.c
Examining data/cups-filters-1.28.5/backend/test1284.c
Examining data/cups-filters-1.28.5/backend/parallel.c
Examining data/cups-filters-1.28.5/backend/ieee1284.c
Examining data/cups-filters-1.28.5/backend/beh.c
Examining data/cups-filters-1.28.5/backend/backend-private.h
Examining data/cups-filters-1.28.5/backend/cups-brf.c
Examining data/cups-filters-1.28.5/cupsfilters/image-pix.c
Examining data/cups-filters-1.28.5/cupsfilters/image-tiff.c
Examining data/cups-filters-1.28.5/cupsfilters/testrgb.c
Examining data/cups-filters-1.28.5/cupsfilters/dither.c
Examining data/cups-filters-1.28.5/cupsfilters/ppdgenerator.h
Examining data/cups-filters-1.28.5/cupsfilters/rgb.c
Examining data/cups-filters-1.28.5/cupsfilters/image-pnm.c
Examining data/cups-filters-1.28.5/cupsfilters/testcmyk.c
Examining data/cups-filters-1.28.5/cupsfilters/image.h
Examining data/cups-filters-1.28.5/cupsfilters/image-sgi.c
Examining data/cups-filters-1.28.5/cupsfilters/ipp.h
Examining data/cups-filters-1.28.5/cupsfilters/srgb.c
Examining data/cups-filters-1.28.5/cupsfilters/colormanager.h
Examining data/cups-filters-1.28.5/cupsfilters/check.c
Examining data/cups-filters-1.28.5/cupsfilters/driver.h
Examining data/cups-filters-1.28.5/cupsfilters/lut.c
Examining data/cups-filters-1.28.5/cupsfilters/testdither.c
Examining data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.h
Examining data/cups-filters-1.28.5/cupsfilters/image-sun.c
Examining data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c
Examining data/cups-filters-1.28.5/cupsfilters/attr.c
Examining data/cups-filters-1.28.5/cupsfilters/image-zoom.c
Examining data/cups-filters-1.28.5/cupsfilters/image-png.c
Examining data/cups-filters-1.28.5/cupsfilters/pack.c
Examining data/cups-filters-1.28.5/cupsfilters/cmyk.c
Examining data/cups-filters-1.28.5/cupsfilters/testimage.c
Examining data/cups-filters-1.28.5/cupsfilters/image-colorspace.c
Examining data/cups-filters-1.28.5/cupsfilters/image-photocd.c
Examining data/cups-filters-1.28.5/cupsfilters/kmdevices.cpp
Examining data/cups-filters-1.28.5/cupsfilters/image-sgilib.c
Examining data/cups-filters-1.28.5/cupsfilters/image-sgi.h
Examining data/cups-filters-1.28.5/cupsfilters/kmdevices.h
Examining data/cups-filters-1.28.5/cupsfilters/colormanager.c
Examining data/cups-filters-1.28.5/cupsfilters/ipp.c
Examining data/cups-filters-1.28.5/cupsfilters/raster.c
Examining data/cups-filters-1.28.5/cupsfilters/image-jpeg.c
Examining data/cups-filters-1.28.5/cupsfilters/colord.h
Examining data/cups-filters-1.28.5/cupsfilters/image-private.h
Examining data/cups-filters-1.28.5/cupsfilters/image.c
Examining data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c
Examining data/cups-filters-1.28.5/cupsfilters/image-gif.c
Examining data/cups-filters-1.28.5/cupsfilters/image-bmp.c
Examining data/cups-filters-1.28.5/cupsfilters/colord.c
Examining data/cups-filters-1.28.5/cupsfilters/testdriver.c
Examining data/cups-filters-1.28.5/cupsfilters/raster.h
Examining data/cups-filters-1.28.5/filter/pcl-common.h
Examining data/cups-filters-1.28.5/filter/test_pdf1.c
Examining data/cups-filters-1.28.5/filter/rastertops.c
Examining data/cups-filters-1.28.5/filter/mupdftoraster.c
Examining data/cups-filters-1.28.5/filter/texttopdf.c
Examining data/cups-filters-1.28.5/filter/unirast.h
Examining data/cups-filters-1.28.5/filter/pcl-common.c
Examining data/cups-filters-1.28.5/filter/rastertopdf.cpp
Examining data/cups-filters-1.28.5/filter/urftopdf.cpp
Examining data/cups-filters-1.28.5/filter/braille/drivers/index/ubrlto4dot.c
Examining data/cups-filters-1.28.5/filter/gstoraster.c
Examining data/cups-filters-1.28.5/filter/rastertopclx.c
Examining data/cups-filters-1.28.5/filter/pcl.h
Examining data/cups-filters-1.28.5/filter/pdf.cxx
Examining data/cups-filters-1.28.5/filter/test_pdf2.c
Examining data/cups-filters-1.28.5/filter/strcasestr.c
Examining data/cups-filters-1.28.5/filter/common.h
Examining data/cups-filters-1.28.5/filter/foomatic-rip/renderer.h
Examining data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h
Examining data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c
Examining data/cups-filters-1.28.5/filter/foomatic-rip/postscript.h
Examining data/cups-filters-1.28.5/filter/foomatic-rip/process.h
Examining data/cups-filters-1.28.5/filter/foomatic-rip/spooler.h
Examining data/cups-filters-1.28.5/filter/foomatic-rip/postscript.c
Examining data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c
Examining data/cups-filters-1.28.5/filter/foomatic-rip/util.c
Examining data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c
Examining data/cups-filters-1.28.5/filter/foomatic-rip/options.c
Examining data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c
Examining data/cups-filters-1.28.5/filter/foomatic-rip/process.c
Examining data/cups-filters-1.28.5/filter/foomatic-rip/options.h
Examining data/cups-filters-1.28.5/filter/foomatic-rip/pdf.h
Examining data/cups-filters-1.28.5/filter/foomatic-rip/util.h
Examining data/cups-filters-1.28.5/filter/commandtoescpx.c
Examining data/cups-filters-1.28.5/filter/commandtopclx.c
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_tools.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_pdftopdf.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_jcl.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/nup.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/intervalset.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/nup.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_processor.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_xobject.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/intervalset.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_pdftopdf_processor.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_tools.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_cm.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_processor.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_pdftopdf.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/pptypes.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_pdftopdf_processor.cc
Examining data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_jcl.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_xobject.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/pptypes.h
Examining data/cups-filters-1.28.5/filter/pdftopdf/qpdf_cm.cc
Examining data/cups-filters-1.28.5/filter/sys5ippprinter.c
Examining data/cups-filters-1.28.5/filter/imagetopdf.c
Examining data/cups-filters-1.28.5/filter/banner.c
Examining data/cups-filters-1.28.5/filter/textcommon.h
Examining data/cups-filters-1.28.5/filter/pdftops.c
Examining data/cups-filters-1.28.5/filter/getline.c
Examining data/cups-filters-1.28.5/filter/texttotext.c
Examining data/cups-filters-1.28.5/filter/bannertopdf.c
Examining data/cups-filters-1.28.5/filter/common.c
Examining data/cups-filters-1.28.5/filter/pdfutils.c
Examining data/cups-filters-1.28.5/filter/banner.h
Examining data/cups-filters-1.28.5/filter/textcommon.c
Examining data/cups-filters-1.28.5/filter/pdfutils.h
Examining data/cups-filters-1.28.5/filter/imagetoraster.c
Examining data/cups-filters-1.28.5/filter/escp.h
Examining data/cups-filters-1.28.5/filter/rastertoescpx.c
Examining data/cups-filters-1.28.5/filter/pdf.h
Examining data/cups-filters-1.28.5/filter/pdftoraster.cxx

FINAL RESULTS:

data/cups-filters-1.28.5/utils/driverless.c:289:4:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
	  strncat(value, ",PDF", sizeof(value));
data/cups-filters-1.28.5/utils/driverless.c:291:4:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
	  strncat(value, ",PCLM", sizeof(value));
data/cups-filters-1.28.5/utils/driverless.c:293:4:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
	  strncat(value, ",PS", sizeof(value));
data/cups-filters-1.28.5/utils/driverless.c:295:4:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
	  strncat(value, ",PCL", sizeof(value));
data/cups-filters-1.28.5/utils/driverless.c:297:4:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
	  strncat(value, ",PWGRaster", sizeof(value));
data/cups-filters-1.28.5/utils/driverless.c:299:4:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
	  strncat(value, ",AppleRaster", sizeof(value));
data/cups-filters-1.28.5/backend/beh.c:262:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  retval = system(cmdline) >> 8;
data/cups-filters-1.28.5/backend/implicitclass.c:312:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(argv_nt[0], printer_uri);
data/cups-filters-1.28.5/backend/implicitclass.c:319:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(argv_nt[5], (const char*)argv[5]);
data/cups-filters-1.28.5/backend/implicitclass.c:396:2:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execv(buf, argv_nt);
data/cups-filters-1.28.5/backend/parallel.c:397:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access("/dev/parallel/", 0))
data/cups-filters-1.28.5/backend/parallel.c:399:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  else if (!access("/dev/printers/", 0))
data/cups-filters-1.28.5/backend/parallel.c:410:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(device, "%s%d", basedevice, i);
data/cups-filters-1.28.5/backend/parallel.c:450:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(device, 0) == 0)
data/cups-filters-1.28.5/backend/parallel.c:458:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(device, 0) == 0)
data/cups-filters-1.28.5/backend/parallel.c:467:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(device, 0) == 0)
data/cups-filters-1.28.5/backend/parallel.c:479:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(device, 0) == 0)
data/cups-filters-1.28.5/backend/parallel.c:498:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(device, 0) == 0)
data/cups-filters-1.28.5/backend/serial.c:905:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!access(device, 0))
data/cups-filters-1.28.5/backend/serial.c:924:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(device, 0) == 0)
data/cups-filters-1.28.5/backend/serial.c:943:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(device, 0) == 0)
data/cups-filters-1.28.5/cupsfilters/colormanager.c:338:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(full_path, 0)) {
data/cups-filters-1.28.5/cupsfilters/ipp.c:63:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(log + strlen(log),
data/cups-filters-1.28.5/cupsfilters/ipp.c:521:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(CUPS_IPPFIND, ippfind_argv);
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:255:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(argv_nt[5], (const char*)argv[5]);
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:287:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (filter_present("gstoraster") && access(CUPS_GHOSTSCRIPT, X_OK) == 0)
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:312:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (filter_present("gstoraster") && access(CUPS_GHOSTSCRIPT, X_OK) == 0)
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:349:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(CUPS_GHOSTSCRIPT, X_OK) != 0) {
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:355:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	} else if (access(CUPS_POPPLER_PDFTOPS, X_OK) != 0) {
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:374:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (filter_present("gstopxl") && access(CUPS_GHOSTSCRIPT, X_OK) == 0) {
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:393:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (filter_present("gstoraster") && access(CUPS_GHOSTSCRIPT, X_OK) == 0)
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:421:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (filter_present("gstopxl") && access(CUPS_GHOSTSCRIPT, X_OK) == 0) {
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:488:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (filter_present("gstoraster") && access(CUPS_GHOSTSCRIPT, X_OK) == 0)
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:575:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access(filter_path, X_OK) == 0)
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:664:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(filter, argv);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:453:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access(catalogpath, R_OK) == 0) {
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:500:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(catalogpath, R_OK) != 0)
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:2046:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(filter_path, X_OK) == 0) {
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:2198:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ppdname, default_pagesize);
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:149:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s%d.pgm", basename, i);
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:155:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.ppm", basename);
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:327:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s%d.pgm", basename, i);
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:333:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.ppm", basename);
data/cups-filters-1.28.5/cupsfilters/testrgb.c:137:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s%d.pgm", basename, i);
data/cups-filters-1.28.5/cupsfilters/testrgb.c:143:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.ppm", basename);
data/cups-filters-1.28.5/cupsfilters/testrgb.c:267:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename, "%s%d.pgm", basename, i);
data/cups-filters-1.28.5/cupsfilters/testrgb.c:273:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(filename, "%s.ppm", basename);
data/cups-filters-1.28.5/filter/banner.c:119:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(result, "%s/%s", BANNERTOPDF_DATADIR, name);
data/cups-filters-1.28.5/filter/banner.c:122:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(result, "%s/data/%s", datadir, name);
data/cups-filters-1.28.5/filter/bannertopdf.c:184:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(s, valuefmt, ap);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:55:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(logh, msg, ap);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:834:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s-log-XXXXXX", LOG_FILE);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:837:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s-XXXXXX.log", LOG_FILE);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:965:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            else if (access(p, R_OK) != 0) {
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:1028:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if (access(tmp, X_OK) == 0) {
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:1054:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                if (access(tmp, X_OK) == 0) {
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:364:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(opt->varname, opt->name);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:2028:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(s, "%s=%s %%Y", opt->name, userval);
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:55:16:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    FILE *pd = popen(gscommand, "r");
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:147:16:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    FILE *pd = popen(gscommand, "r");
data/cups-filters-1.28.5/filter/foomatic-rip/postscript.c:179:16:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    FILE *pd = popen(gscommand, "r");
data/cups-filters-1.28.5/filter/foomatic-rip/process.c:186:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execl(get_modern_shell(), get_modern_shell(), "-e", "-c", (const char *)cmd, (char *)NULL);
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:49:16:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    FILE *pd = popen(gstestcommand, "r");
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:78:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(job->id, cups_jobid);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:79:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(job->title, cups_jobtitle);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:80:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(job->user, cups_user);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:81:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(job->copies, cups_copies);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:112:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(job->ppdfile, job->printer);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:113:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(job->ppdfile, R_OK) == 0)
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:117:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(job->ppdfile, R_OK) == 0)
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:120:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(job->ppdfile, R_OK) == 0)
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:123:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(job->ppdfile, R_OK) == 0)
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:126:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(job->ppdfile, R_OK) == 0)
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:129:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(job->ppdfile, R_OK) == 0)
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:132:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(job->ppdfile, R_OK) == 0)
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:47:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if (access(dirs[i], W_OK) == 0) {
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:317:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(progname, X_OK) == 0)
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:326:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(filepath, X_OK) == 0) {
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:617:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ds->data, src);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:657:14:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    srclen = vsnprintf(ds->data, ds->alloc, src, ap);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:667:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        vsnprintf(ds->data, ds->alloc, src, ap);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:707:14:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    srclen = vsnprintf(&ds->data[ds->len], restlen, src, ap);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:718:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        srclen = vsnprintf(&ds->data[ds->len], restlen, src, ap);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:803:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(ds->data, str);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:804:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(ds->data, &copy[idx]);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:816:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(NULL, 0, str, ap);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:821:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(strf, len +1, str, ap);
data/cups-filters-1.28.5/filter/gstoraster.c:560:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(full_path, 0)) {
data/cups-filters-1.28.5/filter/gstoraster.c:739:16:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    FILE *pd = popen(gscommand, "r");
data/cups-filters-1.28.5/filter/imagetopdf.c:537:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(linebuf,LINEBUFSIZE,
data/cups-filters-1.28.5/filter/imagetopdf.c:1168:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(linebuf,LINEBUFSIZE,
data/cups-filters-1.28.5/filter/imagetopdf.c:1171:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (system(linebuf) != 0) {
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:35:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr,fmt,ap);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1008:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(filename, sub_process_argv);
data/cups-filters-1.28.5/filter/pdftopdf/qpdf_pdftopdf_processor.cc:459:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr,fmt,ap);
data/cups-filters-1.28.5/filter/pdftops.c:1082:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execvp(CUPS_POPPLER_PDFTOPS, pdf_argv);
data/cups-filters-1.28.5/filter/pdftops.c:1087:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execvp(CUPS_GHOSTSCRIPT, pdf_argv);
data/cups-filters-1.28.5/filter/pdftops.c:1092:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execvp(CUPS_POPPLER_PDFTOCAIRO, pdf_argv);
data/cups-filters-1.28.5/filter/pdftops.c:1107:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execvp(CUPS_ACROREAD, pdf_argv);
data/cups-filters-1.28.5/filter/pdftops.c:1112:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      execvp(CUPS_MUTOOL, pdf_argv);
data/cups-filters-1.28.5/filter/pdftops.c:1487:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(pstops_path, pstops_argv);
data/cups-filters-1.28.5/filter/pdfutils.c:26:7:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  len=vprintf(fmt,ap);
data/cups-filters-1.28.5/filter/pdfutils.h:45:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  __attribute__((format(printf, 2, 3)));
data/cups-filters-1.28.5/filter/rastertopclx.c:921:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(attr->value, Page);
data/cups-filters-1.28.5/filter/rastertopdf.cpp:91:30:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf(format, ...) fprintf(stderr, "DEBUG2: (" PROGRAM ") " format, __VA_ARGS__)
data/cups-filters-1.28.5/filter/rastertopdf.cpp:93:30:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define iprintf(format, ...) fprintf(stderr, "INFO: (" PROGRAM ") " format, __VA_ARGS__)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:214:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(argv_nt[5], (const char*)argv[5]);
data/cups-filters-1.28.5/filter/sys5ippprinter.c:273:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (filter_present("gstoraster") && access(CUPS_GHOSTSCRIPT, X_OK) == 0)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:305:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(CUPS_GHOSTSCRIPT, X_OK) != 0)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:312:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	else if (access(CUPS_POPPLER_PDFTOPS, X_OK) != 0)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:336:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (filter_present("gstopxl") && access(CUPS_GHOSTSCRIPT, X_OK) == 0)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:416:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (filter_present("gstoraster") && access(CUPS_GHOSTSCRIPT, X_OK) == 0)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:501:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access(filter_path, X_OK) == 0)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:600:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(filter, argv);
data/cups-filters-1.28.5/filter/urftopdf.cpp:49:30:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf(format, ...) fprintf(stderr, "DEBUG: (" PROGRAM ") " format, __VA_ARGS__)
data/cups-filters-1.28.5/filter/urftopdf.cpp:54:30:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define iprintf(format, ...) fprintf(stderr, "INFO: (" PROGRAM ") " format, __VA_ARGS__)
data/cups-filters-1.28.5/fontembed/dynstring.c:75:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    need=vsnprintf(ds->buf+ds->len,ds->alloc-ds->len+1,fmt,va);
data/cups-filters-1.28.5/fontembed/dynstring.h:13:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  __attribute__((format(printf, 2, 3)));
data/cups-filters-1.28.5/fontembed/embed_pdf.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret->fontname+7,fontname);
data/cups-filters-1.28.5/fontembed/embed_pdf.c:133:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret->fontname,fontname);
data/cups-filters-1.28.5/fontembed/embed_pdf.c:138:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret->registry,cid_registry);
data/cups-filters-1.28.5/fontembed/embed_pdf.c:142:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret->ordering,cid_ordering);
data/cups-filters-1.28.5/utils/cups-browsed.c:752:7:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      vfprintf(stderr, format, arglist);
data/cups-filters-1.28.5/utils/cups-browsed.c:759:7:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      vfprintf(lfp, format, arglist);
data/cups-filters-1.28.5/utils/cups-browsed.c:884:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(copy->media_source,data->media_source);
data/cups-filters-1.28.5/utils/cups-browsed.c:888:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(copy->media_type,data->media_type);
data/cups-filters-1.28.5/utils/cups-browsed.c:915:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(copy->pagesize,prev->pagesize);
data/cups-filters-1.28.5/utils/cups-browsed.c:1938:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(temp->media_type, media_type);
data/cups-filters-1.28.5/utils/cups-browsed.c:1947:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(temp->media_source, media_source);
data/cups-filters-1.28.5/utils/cups-browsed.c:2081:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ppdsizename, size->media);
data/cups-filters-1.28.5/utils/cups-browsed.c:2632:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(borderless_pagesize, option1);
data/cups-filters-1.28.5/utils/cups-browsed.c:2633:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(borderless_pagesize, t);
data/cups-filters-1.28.5/utils/cups-browsed.c:2643:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(borderless_pagesize, option2);
data/cups-filters-1.28.5/utils/cups-browsed.c:2644:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(borderless_pagesize, t);
data/cups-filters-1.28.5/utils/cups-browsed.c:2719:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(pagesize, size->media);
data/cups-filters-1.28.5/utils/cups-browsed.c:2778:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ppdsizename, size->media);
data/cups-filters-1.28.5/utils/cups-browsed.c:2830:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      sprintf(constraint, "*UIConstraints: *%s %s *%s %s\n",
data/cups-filters-1.28.5/utils/cups-browsed.c:2836:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      sprintf(constraint, "*UIConstraints: *%s %s *%s %s\n",
data/cups-filters-1.28.5/utils/cups-browsed.c:2883:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(printer_make_and_model, cluster_name);
data/cups-filters-1.28.5/utils/cups-browsed.c:3010:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(default_pagesize, ppdname);
data/cups-filters-1.28.5/utils/cups-browsed.c:3049:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(temp->media_type, media_type);
data/cups-filters-1.28.5/utils/cups-browsed.c:3057:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(temp->media_type, AUTO_OPTION);
data/cups-filters-1.28.5/utils/cups-browsed.c:3070:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(temp->media_source, media_source);
data/cups-filters-1.28.5/utils/cups-browsed.c:3078:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(temp->media_source, AUTO_OPTION);
data/cups-filters-1.28.5/utils/cups-browsed.c:5462:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  n = fscanf(fp, "%s", p);
data/cups-filters-1.28.5/utils/cups-browsed.c:5476:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(filename, sizeof(filename), save_options_file,
data/cups-filters-1.28.5/utils/cups-browsed.c:5578:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(filename, sizeof(filename), save_options_file,
data/cups-filters-1.28.5/utils/cups-browsed.c:5698:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(filename, sizeof(filename), save_options_file,
data/cups-filters-1.28.5/utils/cups-browsed.c:5894:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(backup_queue_name, "%s@%s", queue_name, remote_host);
data/cups-filters-1.28.5/utils/cups-browsed.c:10094:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(adminurl_value, "http://%s", host_name);
data/cups-filters-1.28.5/utils/cups-browsed.c:11289:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmpFilter, LDAP_BROWSE_FILTER);
data/cups-filters-1.28.5/utils/driverless.c:511:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(CUPS_IPPFIND, ippfind_argv);
data/cups-filters-1.28.5/backend/beh.c:96:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  uri = getenv("DEVICE_URI");
data/cups-filters-1.28.5/backend/beh.c:143:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    tmpdir = getenv("TMPDIR");
data/cups-filters-1.28.5/backend/beh.c:231:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
data/cups-filters-1.28.5/backend/implicitclass.c:136:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((device_uri = getenv("DEVICE_URI")) == NULL) {
data/cups-filters-1.28.5/backend/implicitclass.c:390:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	serverbin = getenv("CUPS_SERVERBIN");
data/cups-filters-1.28.5/backend/parallel.c:185:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (getenv("CLASS") != NULL)
data/cups-filters-1.28.5/backend/serial.c:203:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if (getenv("CLASS") != NULL)
data/cups-filters-1.28.5/cupsfilters/image.c:575:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((cache_env = getenv("RIP_MAX_CACHE")) != NULL)
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:569:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:731:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:529:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((catalog = _searchDirForCatalog(getenv("CUPS_LOCALEDIR"))) != NULL)
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:533:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((c = getenv("CUPS_DATADIR")) == NULL)
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:2042:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
data/cups-filters-1.28.5/filter/banner.c:117:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((datadir = getenv("CUPS_DATADIR")) == NULL) {
data/cups-filters-1.28.5/filter/bannertopdf.c:280:40:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    opt = add_opt(opt, "printer-name", getenv("PRINTER"));
data/cups-filters-1.28.5/filter/bannertopdf.c:283:40:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    opt = add_opt(opt, "printer-info", getenv("PRINTER_INFO"));
data/cups-filters-1.28.5/filter/bannertopdf.c:428:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        info_linef(s, "Job ID", "%s-%s", getenv("PRINTER"), jobid);
data/cups-filters-1.28.5/filter/bannertopdf.c:453:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        info_line(s, "Description", getenv("PRINTER_INFO"));
data/cups-filters-1.28.5/filter/bannertopdf.c:456:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        info_line(s, "Printer Location", getenv("PRINTER_LOCATION"));
data/cups-filters-1.28.5/filter/bannertopdf.c:462:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        info_line(s, "Printer", getenv("PRINTER"));
data/cups-filters-1.28.5/filter/bannertopdf.c:547:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/filter/bannertopdf.c:549:64:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      fprintf(stderr, "DEBUG: Could not open PPD file '%s'\n", getenv("PPD"));
data/cups-filters-1.28.5/filter/commandtoescpx.c:65:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((ppd = ppdOpenFile(getenv("PPD"))) == NULL)
data/cups-filters-1.28.5/filter/commandtopclx.c:65:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((ppd = ppdOpenFile(getenv("PPD"))) == NULL)
data/cups-filters-1.28.5/filter/common.c:67:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/filter/common.c:422:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((classification = getenv("CLASSIFICATION")) == NULL)
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:816:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((str = getenv("CUPS_SERVERROOT")) != NULL) {
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:869:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("PPD")) {
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:870:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        strncpy(job->ppdfile, getenv("PPD"), sizeof(job->ppdfile) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:871:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (strlen(getenv("PPD")) > 2047)
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:874:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("CUPS_SERVERBIN")) {
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:875:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        strncpy(cupsfilterpath, getenv("CUPS_SERVERBIN"),
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:877:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (strlen(getenv("CUPS_SERVERBIN")) > PATH_MAX-1)
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:883:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    cm_disabled = cmIsPrinterCmDisabled(getenv("PRINTER"));
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:1070:42:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                  cmGetPrinterIccProfile(getenv("PRINTER"),
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:1133:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("GS_LIB"))
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:1134:64:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        _log("Ghostscript extra search path ('GS_LIB'): %s\n", getenv("GS_LIB"));
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:53:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("CUPS_FONTPATH"))
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:54:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        strncpy(path, getenv("CUPS_FONTPATH"), PATH_MAX - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:55:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    else if (getenv("CUPS_DATADIR")) {
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:56:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
       strncpy(path, getenv("CUPS_DATADIR"), PATH_MAX - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:59:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("GS_LIB")) {
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:61:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        strncat(path, getenv("GS_LIB"), PATH_MAX - strlen(path) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:97:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    pname = getenv("PRINTER");
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:201:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    strlcpy(user_default_path, getenv("HOME"), 256);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:43:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *dirs[] = { getenv("TMPDIR"), P_tmpdir, "/tmp" };
data/cups-filters-1.28.5/filter/gstoraster.c:540:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((datadir = getenv("CUPS_DATADIR")) == NULL)
data/cups-filters-1.28.5/filter/gstoraster.c:629:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  outformat_env = getenv("OUTFORMAT");
data/cups-filters-1.28.5/filter/gstoraster.c:649:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  t = getenv("PPD");
data/cups-filters-1.28.5/filter/gstoraster.c:776:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    cm_disabled = cmIsPrinterCmDisabled(getenv("PRINTER"));
data/cups-filters-1.28.5/filter/gstoraster.c:779:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    cmGetPrinterIccProfile(getenv("PRINTER"), &icc_profile, ppd);
data/cups-filters-1.28.5/filter/gstoraster.c:859:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    t = getenv("FINAL_CONTENT_TYPE");
data/cups-filters-1.28.5/filter/gstoraster.c:949:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((t = getenv("CUPS_FONTPATH")) == NULL)
data/cups-filters-1.28.5/filter/imagetoraster.c:420:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    cm_disabled = cmIsPrinterCmDisabled(getenv("PRINTER"));
data/cups-filters-1.28.5/filter/mupdftoraster.c:271:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  t = getenv("PPD");
data/cups-filters-1.28.5/filter/mupdftoraster.c:330:41:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    cm_disabled = cmIsPrinterCmDisabled(getenv("PRINTER"));
data/cups-filters-1.28.5/filter/mupdftoraster.c:333:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    cmGetPrinterIccProfile(getenv("PRINTER"), &icc_profile, ppd);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:512:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *classification = getenv("CLASSIFICATION");
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:680:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *final_content_type = getenv("FINAL_CONTENT_TYPE");
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:825:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *final_content_type = getenv("FINAL_CONTENT_TYPE");
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1104:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    ppd=ppdOpenFile(getenv("PPD")); // getenv (and thus ppd) may be null. This will not cause problems.
data/cups-filters-1.28.5/filter/pdftops.c:442:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/filter/pdftops.c:539:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
data/cups-filters-1.28.5/filter/pdftoraster.cxx:349:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  t = getenv("FINAL_CONTENT_TYPE");
data/cups-filters-1.28.5/filter/pdftoraster.cxx:354:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/filter/pdftoraster.cxx:432:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      cm_disabled = cmIsPrinterCmDisabled(getenv("PRINTER"));
data/cups-filters-1.28.5/filter/pdftoraster.cxx:435:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      cmGetPrinterIccProfile(getenv("PRINTER"), &profile, ppd);
data/cups-filters-1.28.5/filter/rastertoescpx.c:1786:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/filter/rastertopclx.c:352:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      cm_disabled = cmIsPrinterCmDisabled(getenv("PRINTER"));
data/cups-filters-1.28.5/filter/rastertopclx.c:1834:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/filter/rastertopdf.cpp:1333:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((outformat_env = getenv("OUTFORMAT")) == NULL || strcasestr(outformat_env, "pdf"))
data/cups-filters-1.28.5/filter/rastertopdf.cpp:1358:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      cm_disabled = cmIsPrinterCmDisabled(getenv("PRINTER"));
data/cups-filters-1.28.5/filter/rastertopdf.cpp:1361:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/filter/rastertops.c:398:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/filter/sys5ippprinter.c:239:47:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (filter_present("rastertopdf") && (val = getenv("CONTENT_TYPE")) != NULL &&
data/cups-filters-1.28.5/filter/sys5ippprinter.c:243:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	     (val = getenv("CONTENT_TYPE")) != NULL &&
data/cups-filters-1.28.5/filter/sys5ippprinter.c:495:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:670:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
data/cups-filters-1.28.5/filter/textcommon.c:558:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((val = getenv("CONTENT_TYPE")) == NULL)
data/cups-filters-1.28.5/filter/textcommon.c:708:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      WriteProlog(argv[3], argv[2], getenv("CLASSIFICATION"),
data/cups-filters-1.28.5/filter/texttopdf.c:315:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((datadir = getenv("CUPS_DATADIR")) == NULL)
data/cups-filters-1.28.5/filter/texttopdf.c:377:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  charset = getenv("CHARSET");
data/cups-filters-1.28.5/filter/texttotext.c:260:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  ppd = ppdOpenFile(getenv("PPD"));
data/cups-filters-1.28.5/utils/cups-browsed.c:8374:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	  if ((cups_serverbin = getenv("CUPS_SERVERBIN")) == NULL)
data/cups-filters-1.28.5/utils/cups-browsed.c:12355:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("IPP_PORT") != NULL) {
data/cups-filters-1.28.5/utils/cups-browsed.c:12357:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	     "localhost:%s", getenv("IPP_PORT"));
data/cups-filters-1.28.5/utils/cups-browsed.c:12361:4:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		 getenv("IPP_PORT"));
data/cups-filters-1.28.5/utils/cups-browsed.c:12370:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("CUPS_SERVER") != NULL) {
data/cups-filters-1.28.5/utils/cups-browsed.c:12371:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    strncpy(local_server_str, getenv("CUPS_SERVER"),
data/cups-filters-1.28.5/utils/cups-browsed.c:12376:4:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		 getenv("CUPS_SERVER"));
data/cups-filters-1.28.5/utils/driverless.c:745:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((val = getenv("DEVICE_TYPE")) != NULL &&
data/cups-filters-1.28.5/utils/driverless.c:811:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((val = getenv("SOFTWARE")) != NULL &&
data/cups-filters-1.28.5/backend/beh.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpfilename[1024], buf[8192];
data/cups-filters-1.28.5/backend/beh.c:140:11:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    FILE *tmpfile;
data/cups-filters-1.28.5/backend/beh.c:147:10:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    fd = mkstemp(tmpfilename);
data/cups-filters-1.28.5/backend/beh.c:156:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      fwrite(buf, 1, bytes, tmpfile);
data/cups-filters-1.28.5/backend/beh.c:157:12:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    fclose(tmpfile);
data/cups-filters-1.28.5/backend/beh.c:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		scheme[1024],           /* Scheme from URI */
data/cups-filters-1.28.5/backend/cups-brf.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4096];
data/cups-filters-1.28.5/backend/cups-brf.c:69:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(filename,  O_RDONLY);
data/cups-filters-1.28.5/backend/ieee1284.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	devparport[16];		/* /dev/parportN */
data/cups-filters-1.28.5/backend/ieee1284.c:139:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((devparportfd = open(devparport, O_RDWR | O_NOCTTY)) != -1)
data/cups-filters-1.28.5/backend/ieee1284.c:317:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		temp[256],	/* Temporary manufacturer string */
data/cups-filters-1.28.5/backend/ieee1284.c:447:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char	temp[1024];		/* Temporary make and model */
data/cups-filters-1.28.5/backend/ieee1284.c:518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		key[256],		/* Key string */
data/cups-filters-1.28.5/backend/implicitclass.c:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char scheme[64], username[32], queue_name[1024], resource[32],
data/cups-filters-1.28.5/backend/implicitclass.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dest_host[1024];	/* Destination host */
data/cups-filters-1.28.5/backend/implicitclass.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/backend/implicitclass.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    *argv_nt[8];
data/cups-filters-1.28.5/backend/implicitclass.c:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/cups-filters-1.28.5/backend/implicitclass.c:245:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[8192];
data/cups-filters-1.28.5/backend/implicitclass.c:266:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(argv[6], O_RDONLY);
data/cups-filters-1.28.5/backend/parallel.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		method[255],		/* Method in URI */
data/cups-filters-1.28.5/backend/parallel.c:124:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((print_fd = open(argv[6], O_RDONLY)) < 0)
data/cups-filters-1.28.5/backend/parallel.c:130:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    copies = atoi(argv[4]);
data/cups-filters-1.28.5/backend/parallel.c:170:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    device_fd = open(resource, O_WRONLY | O_EXCL);
data/cups-filters-1.28.5/backend/parallel.c:174:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((device_fd = open(resource, O_RDWR | O_EXCL)) < 0)
data/cups-filters-1.28.5/backend/parallel.c:176:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      device_fd = open(resource, O_WRONLY | O_EXCL);
data/cups-filters-1.28.5/backend/parallel.c:287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		print_buffer[8192],	/* Print data buffer */
data/cups-filters-1.28.5/backend/parallel.c:389:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	device[512],		/* Device filename */
data/cups-filters-1.28.5/backend/parallel.c:398:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(basedevice, "/dev/parallel/");
data/cups-filters-1.28.5/backend/parallel.c:400:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(basedevice, "/dev/printers/");
data/cups-filters-1.28.5/backend/parallel.c:402:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(basedevice, "/dev/lp");
data/cups-filters-1.28.5/backend/parallel.c:411:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_RDWR | O_EXCL)) < 0)
data/cups-filters-1.28.5/backend/parallel.c:412:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(device, O_WRONLY);
data/cups-filters-1.28.5/backend/parallel.c:440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		device[255];	/* Device filename */
data/cups-filters-1.28.5/backend/parallel.c:449:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/ecpp%d", i);
data/cups-filters-1.28.5/backend/parallel.c:457:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/bpp%d", i);
data/cups-filters-1.28.5/backend/parallel.c:465:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/lp%d", i);
data/cups-filters-1.28.5/backend/parallel.c:478:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/pm%02d", i);
data/cups-filters-1.28.5/backend/parallel.c:493:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(device, "/dev/sts/lpN%d%c", j, funky_hex[n]);
data/cups-filters-1.28.5/backend/parallel.c:495:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(device, "/dev/sts/lp%c%d%c", i + 'C', j,
data/cups-filters-1.28.5/backend/parallel.c:511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	device[255];		/* Device filename */
data/cups-filters-1.28.5/backend/parallel.c:516:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/lpt%d", i);
data/cups-filters-1.28.5/backend/parallel.c:517:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY)) >= 0)
data/cups-filters-1.28.5/backend/parallel.c:523:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/lpa%d", i);
data/cups-filters-1.28.5/backend/parallel.c:524:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY)) >= 0)
data/cups-filters-1.28.5/backend/parallel.c:553:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		print_buffer[8192],	/* Print data buffer */
data/cups-filters-1.28.5/backend/parallel.c:810:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			data[2048];	/* Request/response data */
data/cups-filters-1.28.5/backend/serial.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		method[255],		/* Method in URI */
data/cups-filters-1.28.5/backend/serial.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		print_buffer[8192],	/* Print data buffer */
data/cups-filters-1.28.5/backend/serial.c:160:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((print_fd = open(argv[6], O_RDONLY)) < 0)
data/cups-filters-1.28.5/backend/serial.c:166:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    copies = atoi(argv[4]);
data/cups-filters-1.28.5/backend/serial.c:200:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((device_fd = open(resource, O_RDWR | O_NOCTTY | O_EXCL |
data/cups-filters-1.28.5/backend/serial.c:297:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        print_size = atoi(value) / 100;
data/cups-filters-1.28.5/backend/serial.c:300:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cfsetispeed(&opts, atoi(value));
data/cups-filters-1.28.5/backend/serial.c:301:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	cfsetospeed(&opts, atoi(value));
data/cups-filters-1.28.5/backend/serial.c:303:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        switch (atoi(value))
data/cups-filters-1.28.5/backend/serial.c:359:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        switch (atoi(value))
data/cups-filters-1.28.5/backend/serial.c:447:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        switch (atoi(value))
data/cups-filters-1.28.5/backend/serial.c:709:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		print_buffer[8192],	/* Print data buffer */
data/cups-filters-1.28.5/backend/serial.c:813:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			device[255];	/* Device filename */
data/cups-filters-1.28.5/backend/serial.c:814:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			info[255];	/* Device info/description */
data/cups-filters-1.28.5/backend/serial.c:822:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/ttyS%d", i);
data/cups-filters-1.28.5/backend/serial.c:824:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:863:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/usb/ttyUSB%d", i);
data/cups-filters-1.28.5/backend/serial.c:864:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:870:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/ttyUSB%d", i);
data/cups-filters-1.28.5/backend/serial.c:871:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:882:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(device, "/dev/ttyQ%02de%d", i, j);
data/cups-filters-1.28.5/backend/serial.c:883:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:894:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		device[255];		/* Device filename */
data/cups-filters-1.28.5/backend/serial.c:895:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		info[255];		/* Device info/description */
data/cups-filters-1.28.5/backend/serial.c:904:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/cua/%c", 'a' + i);
data/cups-filters-1.28.5/backend/serial.c:923:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/term/%02d", i);
data/cups-filters-1.28.5/backend/serial.c:938:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(device, "/dev/sts/ttyN%d%c", j, funky_hex[n]);
data/cups-filters-1.28.5/backend/serial.c:940:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(device, "/dev/sts/tty%c%d%c", i + 'C', j,
data/cups-filters-1.28.5/backend/serial.c:956:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	device[255];			/* Device filename */
data/cups-filters-1.28.5/backend/serial.c:957:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	info[255];			/* Device info/description */
data/cups-filters-1.28.5/backend/serial.c:966:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/ttyd%c", funky_hex[i]);
data/cups-filters-1.28.5/backend/serial.c:967:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:984:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(device, "/dev/ttyc%d%c", i, funky_hex[j]);
data/cups-filters-1.28.5/backend/serial.c:985:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:992:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(device, "/dev/ttyC%d%c", i, funky_hex[j]);
data/cups-filters-1.28.5/backend/serial.c:993:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:1008:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(device, "/dev/ttyD%d%c", i, funky_hex[j]);
data/cups-filters-1.28.5/backend/serial.c:1009:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:1023:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/ttyE%c", funky_hex[i]);
data/cups-filters-1.28.5/backend/serial.c:1024:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:1038:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/ttyA%d", i + 1);
data/cups-filters-1.28.5/backend/serial.c:1039:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:1049:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	device[255];			/* Device filename */
data/cups-filters-1.28.5/backend/serial.c:1050:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	info[255];			/* Device info/description */
data/cups-filters-1.28.5/backend/serial.c:1059:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(device, "/dev/tty%02d", i);
data/cups-filters-1.28.5/backend/serial.c:1060:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:1077:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(device, "/dev/ttyCZ%02d%02d", i, j);
data/cups-filters-1.28.5/backend/serial.c:1078:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open(device, O_WRONLY | O_NOCTTY | O_NDELAY)) >= 0)
data/cups-filters-1.28.5/backend/serial.c:1120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		serialName[128];
data/cups-filters-1.28.5/backend/serial.c:1121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		bsdPath[1024];
data/cups-filters-1.28.5/backend/serial.c:1193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			data[2048];	/* Request/response data */
data/cups-filters-1.28.5/backend/test1284.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	device_id[1024],		/* 1284 device ID string */
data/cups-filters-1.28.5/backend/test1284.c:57:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(argv[i], O_RDWR)) < 0)
data/cups-filters-1.28.5/cupsfilters/cmyk.c:1030:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		spec[PPD_MAX_NAME];	/* Profile name */
data/cups-filters-1.28.5/cupsfilters/cmyk.c:1092:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num_channels = atoi(attr->value);
data/cups-filters-1.28.5/cupsfilters/colord.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char q_keyword[PPD_MAX_NAME];
data/cups-filters-1.28.5/cupsfilters/colord.c:176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[256];
data/cups-filters-1.28.5/cupsfilters/colormanager.c:291:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char full_path[1024];
data/cups-filters-1.28.5/cupsfilters/colormanager.c:293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qualifer_tmp[1024];
data/cups-filters-1.28.5/cupsfilters/dither.c:65:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char	logtable[16384];	/* Error magnitude for randomness */
data/cups-filters-1.28.5/cupsfilters/driver.h:80:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	rgb[3];			/* sRGB values */
data/cups-filters-1.28.5/cupsfilters/driver.h:81:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	colors[CUPS_MAX_RGB];	/* Color values */
data/cups-filters-1.28.5/cupsfilters/driver.h:92:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	black[CUPS_MAX_RGB];	/* Cached black (sRGB = 0,0,0) */
data/cups-filters-1.28.5/cupsfilters/driver.h:93:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	white[CUPS_MAX_RGB];	/* Cached white (sRGB = 255,255,255) */
data/cups-filters-1.28.5/cupsfilters/driver.h:98:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	black_lut[256];		/* Black generation LUT */
data/cups-filters-1.28.5/cupsfilters/driver.h:99:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	color_lut[256];		/* Color removal LUT */
data/cups-filters-1.28.5/cupsfilters/driver.h:111:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char
data/cups-filters-1.28.5/cupsfilters/driver.h:114:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char
data/cups-filters-1.28.5/cupsfilters/image-colorspace.c:839:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(out, in, count * 3);
data/cups-filters-1.28.5/cupsfilters/image-colorspace.c:1113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, in, count);
data/cups-filters-1.28.5/cupsfilters/image-colorspace.c:1256:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(c, temp, sizeof(temp));
data/cups-filters-1.28.5/cupsfilters/image-gif.c:75:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	buf[1024];		/* Input buffer */
data/cups-filters-1.28.5/cupsfilters/image-gif.c:304:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static unsigned char	buf[280];	/* Input buffer */
data/cups-filters-1.28.5/cupsfilters/image-gif.c:309:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const unsigned char bits[8] =	/* Bit masks for codes */
data/cups-filters-1.28.5/cupsfilters/image-gif.c:645:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char	buf[260];	/* Block buffer */
data/cups-filters-1.28.5/cupsfilters/image-png.c:263:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out, inptr, img->xsize);
data/cups-filters-1.28.5/cupsfilters/image-pnm.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		line[255],		/* Input line */
data/cups-filters-1.28.5/cupsfilters/image-pnm.c:74:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  format = atoi(lineptr);
data/cups-filters-1.28.5/cupsfilters/image-pnm.c:84:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      img->xsize = atoi(lineptr);
data/cups-filters-1.28.5/cupsfilters/image-pnm.c:98:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      img->ysize = atoi(lineptr);
data/cups-filters-1.28.5/cupsfilters/image-pnm.c:116:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	maxval = atoi(lineptr);
data/cups-filters-1.28.5/cupsfilters/image-private.h:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			cachename[256];	/* Tile cache filename */
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:181:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(filename, "rb");
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:183:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(filename, "wb+");
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	name[80];			/* Name of file in image header */
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:527:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(sgip->arle_row, row, sgip->xsize * sizeof(unsigned short));
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:547:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	b[4];			/* Bytes from file */
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:563:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	b[2];			/* Bytes from file */
data/cups-filters-1.28.5/cupsfilters/image-sun.c:89:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	cmap[3][256];		/* colormap */
data/cups-filters-1.28.5/cupsfilters/image.c:246:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pixels, ib, count * bpp);
data/cups-filters-1.28.5/cupsfilters/image.c:303:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	header[16],		/* First 16 bytes of file */
data/cups-filters-1.28.5/cupsfilters/image.c:317:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(filename, "r")) == NULL)
data/cups-filters-1.28.5/cupsfilters/image.c:534:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ib, pixels, count * bpp);
data/cups-filters-1.28.5/cupsfilters/ipp.c:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *pseudo_argv[2];
data/cups-filters-1.28.5/cupsfilters/ipp.c:80:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd2 = open("/dev/null", O_WRONLY);
data/cups-filters-1.28.5/cupsfilters/ipp.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char scheme[10], userpass[1024], host_name[1024], resource[1024];
data/cups-filters-1.28.5/cupsfilters/ipp.c:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char valuebuffer[65536];
data/cups-filters-1.28.5/cupsfilters/ipp.c:429:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *ippfind_argv[100],	/* Arguments for ippfind */
data/cups-filters-1.28.5/cupsfilters/ipp.h:44:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char get_printer_attributes_log[LOGSIZE];
data/cups-filters-1.28.5/cupsfilters/lut.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		name[PPD_MAX_NAME],	/* Attribute name */
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		buffer[8192];		/* Copy buffer */
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	        *argv_nt[8];		/* NULL-terminated array of the command
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:566:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		filter_path[1024]; /* Path to filter executable */
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:616:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        infd = open("/dev/null", O_RDONLY);
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:626:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        outfd = open("/dev/null", O_WRONLY);
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:637:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open("/dev/null", O_RDWR)) > 2) {
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:645:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open("/dev/null", O_RDWR)) > 3) {
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:653:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open("/dev/null", O_RDWR)) > 4) {
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:684:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		program[1024];	     /* Program to run */
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:907:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(result, p1, p2 - p1);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ppdgenerator_msg[1024];
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:359:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newsize, size, sizeof(cups_size_t));
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			scheme[32],	/* URL scheme */
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:445:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char subdirpath[1024], catalogpath[2048], lang[8];
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:743:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpfile[1024];
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:743:8:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  char tmpfile[1024];
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:747:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[65536];
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:773:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if (get_url(location, tmpfile, sizeof(tmpfile)))
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:773:43:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if (get_url(location, tmpfile, sizeof(tmpfile)))
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:774:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      filename = tmpfile;
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:951:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  if (filename == tmpfile)
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1581:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			make[256],	/* Make and model */
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1622:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			buf[256],
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1629:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			outbin_properties[1024];
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1840:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	pattern[33];		/* Password pattern */
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1966:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	lowdpi = atoi(rs + 2);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1968:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  hidpi = atoi(rs + 1);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:2205:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	tleft[256],		/* Left string */
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:2358:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char	tmax[256], tmin[256];	/* Min/max values */
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:2542:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    human_readable = (char *)_cupsLangString(lang, sources[j][1]);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:2733:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    human_readable = (char *)_cupsLangString(lang, media_types[j][1]);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:3157:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    human_readable = (char *)_cupsLangString(lang, output_bins[j][1]);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:3398:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      human_readable = (char *)_cupsLangString(lang, finishings[j][1]);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:3491:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      human_readable = (char *)_cupsLangString(lang, finishings[j][1]);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:3591:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      human_readable = (char *)_cupsLangString(lang, finishings[j][1]);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:3684:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      human_readable = (char *)_cupsLangString(lang, finishings[j][1]);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:3875:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		(char *)_cupsLangString(lang,
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:3933:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		(char *)_cupsLangString(lang,
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:3987:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		(char *)_cupsLangString(lang, scaling_types[j][1]);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:4043:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char       member_value[256];	/* Member attribute value */
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:4377:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(name, sizeptr + 1, (size_t)(dimptr - sizeptr - 1));
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.h:56:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char ppdgenerator_msg[1024];
data/cups-filters-1.28.5/cupsfilters/raster.c:59:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, src, srclen);
data/cups-filters-1.28.5/cupsfilters/raster.c:167:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(h->MediaClass, "PwgRaster");
data/cups-filters-1.28.5/cupsfilters/raster.c:468:22:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    h->MediaWeight = atol(val);
data/cups-filters-1.28.5/cupsfilters/raster.c:512:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    h->NumCopies = atol(val);
data/cups-filters-1.28.5/cupsfilters/raster.c:632:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      size = atol(val) * 72.0 / 2540.0; 
data/cups-filters-1.28.5/cupsfilters/raster.c:646:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      size = atol(val) * 72.0 / 2540.0; 
data/cups-filters-1.28.5/cupsfilters/raster.c:660:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      size = atol(val) * 72.0 / 2540.0; 
data/cups-filters-1.28.5/cupsfilters/raster.c:672:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      size = atol(val) * 72.0 / 2540.0; 
data/cups-filters-1.28.5/cupsfilters/raster.c:939:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int impressions = atoi(val);
data/cups-filters-1.28.5/cupsfilters/raster.c:1034:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int alternateprimary = atoi(val);		/* SRGB value for black
data/cups-filters-1.28.5/cupsfilters/raster.c:1043:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int quality = atoi(val);		/* print-quality value */
data/cups-filters-1.28.5/cupsfilters/raster.c:1059:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int vendorid = atoi(val);		/* USB ID of manufacturer */
data/cups-filters-1.28.5/cupsfilters/raster.c:1068:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int vendorlength = atoi(val);		/* How many bytes of vendor
data/cups-filters-1.28.5/cupsfilters/rgb.c:106:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(output, output - rgbptr->num_channels, rgbsize);
data/cups-filters-1.28.5/cupsfilters/rgb.c:117:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(output, rgbptr->black, rgbsize);
data/cups-filters-1.28.5/cupsfilters/rgb.c:128:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(output, rgbptr->white, rgbsize);
data/cups-filters-1.28.5/cupsfilters/rgb.c:229:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(output, output - rgbptr->num_channels, rgbsize);
data/cups-filters-1.28.5/cupsfilters/rgb.c:240:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(output, rgbptr->black, rgbsize);
data/cups-filters-1.28.5/cupsfilters/rgb.c:251:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(output, rgbptr->white, rgbsize);
data/cups-filters-1.28.5/cupsfilters/rgb.c:318:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		spec[PPD_MAX_NAME];	/* Profile name */
data/cups-filters-1.28.5/cupsfilters/rgb.c:435:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char		rgb[3];		/* Temporary RGB value */
data/cups-filters-1.28.5/cupsfilters/rgb.c:506:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tempr[r][g][b], samples[i].colors, num_channels);
data/cups-filters-1.28.5/cupsfilters/srgb.c:24:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char cups_srgb_lut[256] =
data/cups-filters-1.28.5/cupsfilters/srgb.c:51:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char cups_scmy_lut[256] =
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			filename[255];	/* Output filename */
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			line[255];	/* Line from PGM file */
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:88:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char		input[7000];	/* Line to separate */
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:102:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen("image.pgm", "rb");
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:150:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out[i] = fopen(filename, "wb");
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:156:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  comp = fopen(filename, "wb");
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:265:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			filename[255];	/* Output filename */
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:266:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			line[255];	/* Line from PPM file */
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:270:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char		input[7000];	/* Line to separate */
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:284:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen("image.ppm", "rb");
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:328:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out[i] = fopen(filename, "wb");
data/cups-filters-1.28.5/cupsfilters/testcmyk.c:334:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  comp = fopen(filename, "wb");
data/cups-filters-1.28.5/cupsfilters/testdither.c:54:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	pixels[512],	/* Dither pixels */
data/cups-filters-1.28.5/cupsfilters/testdither.c:79:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pixvals[nlutvals] = atoi(argv[x]);
data/cups-filters-1.28.5/cupsfilters/testdriver.c:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		scheme[255],		/* URI scheme */
data/cups-filters-1.28.5/cupsfilters/testimage.c:61:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(argv[2], "wb");
data/cups-filters-1.28.5/cupsfilters/testrgb.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			filename[255];	/* Output filename */
data/cups-filters-1.28.5/cupsfilters/testrgb.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			line[255];	/* Line from PPM file */
data/cups-filters-1.28.5/cupsfilters/testrgb.c:102:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char		input[7000];	/* Line to rgbarate */
data/cups-filters-1.28.5/cupsfilters/testrgb.c:103:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char		output[48000],	/* Output rgb data */
data/cups-filters-1.28.5/cupsfilters/testrgb.c:116:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen("image.pgm", "rb");
data/cups-filters-1.28.5/cupsfilters/testrgb.c:138:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out[i] = fopen(filename, "wb");
data/cups-filters-1.28.5/cupsfilters/testrgb.c:144:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  comp = fopen(filename, "wb");
data/cups-filters-1.28.5/cupsfilters/testrgb.c:227:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			filename[255];	/* Output filename */
data/cups-filters-1.28.5/cupsfilters/testrgb.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			line[255];	/* Line from PPM file */
data/cups-filters-1.28.5/cupsfilters/testrgb.c:232:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char		input[7000];	/* Line to rgbarate */
data/cups-filters-1.28.5/cupsfilters/testrgb.c:233:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char		output[48000],	/* Output rgb data */
data/cups-filters-1.28.5/cupsfilters/testrgb.c:246:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen("image.ppm", "rb");
data/cups-filters-1.28.5/cupsfilters/testrgb.c:268:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out[i] = fopen(filename, "wb");
data/cups-filters-1.28.5/cupsfilters/testrgb.c:274:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  comp = fopen(filename, "wb");
data/cups-filters-1.28.5/filter/banner.c:140:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    else if (!(f = fopen(filename, "r"))) {
data/cups-filters-1.28.5/filter/bannertopdf.c:60:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return value ? atoi(value) : def;
data/cups-filters-1.28.5/filter/bannertopdf.c:135:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	media_limits[0] = atol(val) * 72.0 / 2540.0; 
data/cups-filters-1.28.5/filter/bannertopdf.c:138:20:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	media_limits[1] = atol(val) * 72.0 / 2540.0; 
data/cups-filters-1.28.5/filter/bannertopdf.c:141:29:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	media_limits[2] = *width - atol(val) * 72.0 / 2540.0; 
data/cups-filters-1.28.5/filter/bannertopdf.c:144:30:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	media_limits[3] = *length - atol(val) * 72.0 / 2540.0; 
data/cups-filters-1.28.5/filter/bannertopdf.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/cups-filters-1.28.5/filter/bannertopdf.c:219:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(buf, "unknown");
data/cups-filters-1.28.5/filter/bannertopdf.c:391:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if ((s = tmpfile()) == NULL) {
data/cups-filters-1.28.5/filter/commandtoescpx.c:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		line[1024],			/* Line from file */
data/cups-filters-1.28.5/filter/commandtoescpx.c:77:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(argv[6], "r")) == NULL)
data/cups-filters-1.28.5/filter/commandtoescpx.c:154:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      phase = atoi(lineptr + 18);
data/cups-filters-1.28.5/filter/commandtopclx.c:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		line[1024],			/* Line from file */
data/cups-filters-1.28.5/filter/commandtopclx.c:77:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(argv[6], "r")) == NULL)
data/cups-filters-1.28.5/filter/common.c:219:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    Orientation = atoi(val) - 3;
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:134:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char printer_model[256] = "";
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:135:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char attrpath[256] = "";
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:150:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char colorprofile [128];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:151:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cupsfilter[256];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:165:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char gspath[PATH_MAX] = "gs";
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:170:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char echopath[PATH_MAX] = "echo";
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:173:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cupsfilterpath[PATH_MAX] = "/usr/local/lib/cups/filter:"
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:183:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        debug = atoi(value);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:206:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[256];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:209:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fh = fopen(filename, "r");
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:312:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp [256];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:562:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[8192];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:563:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpfilename[PATH_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:573:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, "r");
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:605:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char pdf2ps_cmd[CMDLINE_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:618:13:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		    FILE *tmpfile;
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:621:12:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
		    fd = mkstemp(tmpfilename);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:627:17:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		    copy_file(tmpfile, stdin, buf, n);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:628:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		    fclose(tmpfile);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:707:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
                    FILE *tmpfile;
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:710:26:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
                    fd = mkstemp(tmpfilename);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:723:31:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
                    copy_file(tmpfile, stdin, buf, n);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:724:32:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
                    if (fflush(tmpfile) == EOF)
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:726:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
                    rewind(tmpfile);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:728:36:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
                    ret = print_ps(tmpfile, NULL, 0, tmpfilename);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:729:28:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
                    fclose(tmpfile);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:785:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024], profile_arg[256], gstoraster[512];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:835:11:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	int fd = mkstemp (tmp);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:1104:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(cmd, "cat%A%B%C%D%E%F%G%H%I%J%K%L%M%Z");
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:1110:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(printer_model, "Raw queue");
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char printer[256];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[128];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char user[128];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[128];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char title[2048];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ppdfile[2048];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char copies[128];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:110:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char cupsfilterpath[PATH_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:116:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char gspath[PATH_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.h:117:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char echopath[PATH_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:41:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char printer_model [256];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:42:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char printer_id [256];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:43:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char driver [128];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:44:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cmd [4096];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:45:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cmd_pdf [4096];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char cupsfilter [256];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:57:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char jclbegin[256] = "\033%-12345X@PJL\n";
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:61:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char jcltointerpreter[256] = "";
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:65:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char jclend[256] = "\033%-12345X@PJL RESET\n";
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:69:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char jclprefix[256] = "@PJL ";
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:512:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            i = atoi(str);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:513:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            imin = !isempty(param->min) ? atoi(param->min) : -999999;
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:514:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            imax = !isempty(param->max) ? atoi(param->max) : 1000000;
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:566:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if (!isempty(param->min) && len < atoi(param->min)) {
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:571:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            if (!isempty(param->max) && len > atoi(param->max)) {
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[20];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:590:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[20];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:617:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char unit[3];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:819:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char width[30], height[30];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:825:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        snprintf(width, 20, "%d", atoi(paramvalues[0]));
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:826:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        snprintf(height, 20, "%d", atoi(paramvalues[1]));
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:864:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char orderstr[8];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[32], style[32];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpstr[16];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1219:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tmpstr, "%04d", t->tm_year + 1900);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1224:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tmpstr, "%02d", t->tm_mon + 1);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1229:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tmpstr, "%02d", t->tm_mday);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1234:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tmpstr, "%02d", t->tm_hour);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1239:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tmpstr, "%02d", t->tm_min);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1244:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(tmpstr, "%02d", t->tm_sec);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rxstr[256], tmp[128];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[128];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char typestr[33];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1440:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(param->name, "foomatic-param");
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1556:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line [256];            /* PPD line length is max 255 (excl. \0) */
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1558:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char key[128], name[64], text[64];
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1566:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fh = fopen(filename, "r");
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1959:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                dstrcpyf(open, "[{\n%%%%BeginFeature: *%s ", opt->name);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1961:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                    dstrcatf(open, is_true_string(userval) ? "True\n" : "False\n");
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1963:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                    dstrcatf(open, "%s\n", userval);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:2059:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    free_dstr(open);
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value [128];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text [128];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char command[65536];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [128];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text [128];       /* formerly comment, changed to 'text' to
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char min[20], max[20]; /* contents depend on 'type' */
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name [128];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text [128];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char varname [128];         /* clean version of 'name' (no spaces etc.) */
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:123:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char jclbegin[256];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:124:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char jcltointerpreter[256];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:125:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char jclend[256];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:126:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char jclprefix[256];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:128:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char cmd[4096];
data/cups-filters-1.28.5/filter/foomatic-rip/options.h:129:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char cmd_pdf[4096];
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gscommand[CMDLINE_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[63] = "";
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:116:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int pdf_extract_pages(char filename[PATH_MAX],
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gscommand[CMDLINE_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_arg[PATH_MAX], first_arg[50], last_arg[50];
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:128:15:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    if ((fd = mkstemp(filename)) == -1)
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:160:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpfile[PATH_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:160:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    char tmpfile[PATH_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:171:32:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        if (!pdf_extract_pages(tmpfile, filename, firstpage, lastpage))
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:173:32:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        dstrcatf(cmd, " < %s", tmpfile);
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:179:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        unlink(tmpfile);
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpfilename[PATH_MAX] = "";
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:301:15:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        FILE *tmpfile;
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:304:14:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
        fd = mkstemp(tmpfilename);
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:311:19:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        copy_file(tmpfile, stdin, alreadyread, len);
data/cups-filters-1.28.5/filter/foomatic-rip/pdf.c:312:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        fclose(tmpfile);
data/cups-filters-1.28.5/filter/foomatic-rip/postscript.c:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gscommand[65536];
data/cups-filters-1.28.5/filter/foomatic-rip/postscript.c:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[31] = "";
data/cups-filters-1.28.5/filter/foomatic-rip/postscript.c:341:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char optionname [128];
data/cups-filters-1.28.5/filter/foomatic-rip/postscript.c:342:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char value [128];
data/cups-filters-1.28.5/filter/foomatic-rip/postscript.c:915:59:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        get_current_job()->rbinumcopies = atoi(p);
data/cups-filters-1.28.5/filter/foomatic-rip/process.c:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[64];
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gstestcommand[CMDLINE_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[10] = "";
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:272:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[128];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path [PATH_MAX] = "";
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cups_jobid [128];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cups_user [128];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cups_jobtitle [2048];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cups_copies [128];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cups_filename [256];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line [1024];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:149:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!(fh = fopen(configfile, "r")))
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char configfile [1024];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp [1024];
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char user_default_path [PATH_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:315:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filepath[PATH_MAX];
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:510:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cstr[3];
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:696:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ds->data[ds->len], src, srclen +1);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:1126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[8192];
data/cups-filters-1.28.5/filter/gstoraster.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[5];
data/cups-filters-1.28.5/filter/gstoraster.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];
data/cups-filters-1.28.5/filter/gstoraster.c:107:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      h->NumCopies = atoi(p+1);
data/cups-filters-1.28.5/filter/gstoraster.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpstr[1024];
data/cups-filters-1.28.5/filter/gstoraster.c:386:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/cups-filters-1.28.5/filter/gstoraster.c:512:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char full_path[1024];
data/cups-filters-1.28.5/filter/gstoraster.c:514:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char qualifer_tmp[1024];
data/cups-filters-1.28.5/filter/gstoraster.c:590:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/cups-filters-1.28.5/filter/gstoraster.c:595:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpstr[1024];
data/cups-filters-1.28.5/filter/gstoraster.c:693:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(argv[6],"rb")) == 0) {
data/cups-filters-1.28.5/filter/gstoraster.c:703:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/cups-filters-1.28.5/filter/gstoraster.c:732:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gscommand[65536];
data/cups-filters-1.28.5/filter/gstoraster.c:733:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[31] = "";
data/cups-filters-1.28.5/filter/gstoraster.c:844:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (atoi(argv[4]) <= 1)
data/cups-filters-1.28.5/filter/gstoraster.c:919:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      h.HWResolution[0] = atoi(p);
data/cups-filters-1.28.5/filter/gstoraster.c:921:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	h.HWResolution[1] = atoi(p);
data/cups-filters-1.28.5/filter/imagetopdf.c:143:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char linebuf[LINEBUFSIZE];
data/cups-filters-1.28.5/filter/imagetopdf.c:150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/cups-filters-1.28.5/filter/imagetopdf.c:276:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[21];
data/cups-filters-1.28.5/filter/imagetopdf.c:309:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		curdate[255];
data/cups-filters-1.28.5/filter/imagetopdf.c:588:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(row, row + out_length - out_offset, out_offset);
data/cups-filters-1.28.5/filter/imagetopdf.c:690:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		filename[1024];		/* Name of file to print */
data/cups-filters-1.28.5/filter/imagetopdf.c:725:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	buffer[8192];	/* Buffer to read into */
data/cups-filters-1.28.5/filter/imagetopdf.c:761:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  Copies = atoi(argv[4]);
data/cups-filters-1.28.5/filter/imagetopdf.c:791:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    Copies = atoi(choice->choice);
data/cups-filters-1.28.5/filter/imagetopdf.c:874:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      gammaval = atoi(val) * 0.001f;
data/cups-filters-1.28.5/filter/imagetopdf.c:877:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      brightness = atoi(val) * 0.01f;
data/cups-filters-1.28.5/filter/imagetopdf.c:936:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    sat = atoi(val);
data/cups-filters-1.28.5/filter/imagetopdf.c:939:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    hue = atoi(val);
data/cups-filters-1.28.5/filter/imagetopdf.c:986:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    tempOrientation = atoi(val);
data/cups-filters-1.28.5/filter/imagetopdf.c:1033:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    zoom = atoi(val) * 0.01;
data/cups-filters-1.28.5/filter/imagetopdf.c:1070:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      tempOrientation = atoi(val);
data/cups-filters-1.28.5/filter/imagetopdf.c:1159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename2[1024];
data/cups-filters-1.28.5/filter/imagetopdf.c:1237:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      xinches = xinches * atoi(val) / 100;
data/cups-filters-1.28.5/filter/imagetopdf.c:1238:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      yinches = yinches * atoi(val) / 100;
data/cups-filters-1.28.5/filter/imagetopdf.c:1391:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	s[255];		/* New custom page size... */
data/cups-filters-1.28.5/filter/imagetopdf.c:1433:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(s, "Custom.%.0fx%.0f", width, length);
data/cups-filters-1.28.5/filter/imagetopdf.c:1556:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/cups-filters-1.28.5/filter/imagetopdf.c:1596:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    ppdEmitJCL(ppd, stdout, atoi(argv[1]), argv[2], argv[3]);
data/cups-filters-1.28.5/filter/imagetopdf.c:1912:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	c[6];			/* ASCII85 encoded chars */
data/cups-filters-1.28.5/filter/imagetoraster.c:190:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			filename[1024];	/* Name of file to print */
data/cups-filters-1.28.5/filter/imagetoraster.c:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char	buffer[8192];	/* Buffer to read into */
data/cups-filters-1.28.5/filter/imagetoraster.c:265:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  Copies = atoi(argv[4]);
data/cups-filters-1.28.5/filter/imagetoraster.c:293:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    g = atoi(val) * 0.001f;
data/cups-filters-1.28.5/filter/imagetoraster.c:307:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    b = atoi(val) * 0.01f;
data/cups-filters-1.28.5/filter/imagetoraster.c:372:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    sat = atoi(val);
data/cups-filters-1.28.5/filter/imagetoraster.c:375:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    hue = atoi(val);
data/cups-filters-1.28.5/filter/imagetoraster.c:646:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    tempOrientation = atoi(val);
data/cups-filters-1.28.5/filter/imagetoraster.c:703:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    zoom = atoi(val) * 0.01;
data/cups-filters-1.28.5/filter/imagetoraster.c:744:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        tempOrientation = atoi(val);
data/cups-filters-1.28.5/filter/imagetoraster.c:888:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      xinches = xinches * atoi(val) / 100;
data/cups-filters-1.28.5/filter/imagetoraster.c:889:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      yinches = yinches * atoi(val) / 100;
data/cups-filters-1.28.5/filter/imagetoraster.c:1075:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(header.cupsPageSizeName, "Custom");
data/cups-filters-1.28.5/filter/mupdftoraster.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[5];
data/cups-filters-1.28.5/filter/mupdftoraster.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];
data/cups-filters-1.28.5/filter/mupdftoraster.c:105:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      h->NumCopies = atoi(p+1);
data/cups-filters-1.28.5/filter/mupdftoraster.c:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpstr[1024];
data/cups-filters-1.28.5/filter/mupdftoraster.c:236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/cups-filters-1.28.5/filter/mupdftoraster.c:238:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpstr[1024];
data/cups-filters-1.28.5/filter/mupdftoraster.c:243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char infilename[1024];
data/cups-filters-1.28.5/filter/mupdftoraster.c:313:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(argv[6],"rb")) == 0) {
data/cups-filters-1.28.5/filter/mupdftoraster.c:381:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      h.HWResolution[0] = atoi(p);
data/cups-filters-1.28.5/filter/mupdftoraster.c:383:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	h.HWResolution[1] = atoi(p);
data/cups-filters-1.28.5/filter/pcl-common.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		match[255],		/* Match string */
data/cups-filters-1.28.5/filter/pdf.cxx:142:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(stream_data->getBuffer(), buf, len);
data/cups-filters-1.28.5/filter/pdftopdf/nup.cc:38:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char *order[4]={"lr","rl","bt","tb"};
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:71:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *ret=atoi(choice->choice);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:83:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    *ret=atoi(val);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:309:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int copies = atoi(val);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:874:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:913:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1];
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:931:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZ];
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1091:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    param.jobId=atoi(argv[1]);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1094:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    param.numCopies=atoi(argv[4]);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1095:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    param.copies_to_be_logged=atoi(argv[4]);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1156:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((f = fopen(argv[6], "rb")) == NULL) {
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1171:11:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (tmpfile && is_empty(tmpfile)) {
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1171:31:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (tmpfile && is_empty(tmpfile)) {
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1172:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	fclose(tmpfile);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1175:20:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      } else if ((!tmpfile)||
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1176:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
		 (!proc->loadFile(tmpfile,WillStayAlive,qpdf_flatten))) {
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1197:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	infile = fopen(argv[6], "r");
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1200:6:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	if (tmpfile) rewind(tmpfile);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1200:22:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	if (tmpfile) rewind(tmpfile);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1201:11:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	infile = tmpfile;
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1208:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[BUFSIZ];
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1257:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, "-sOutputFile=", 13);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1274:21:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      if (infile != tmpfile)
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1314:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    if (tmpfile)
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:1315:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      fclose(tmpfile);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_jcl.cc:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_jcl.cc:134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_jcl.cc:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_processor.cc:9:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *bstr[3]={"Off","On","Shuffle-Only"};
data/cups-filters-1.28.5/filter/pdftopdf/pptypes.cc:8:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *pstr[3]={"Left/Bottom","Center","Right/Top"};
data/cups-filters-1.28.5/filter/pdftopdf/pptypes.cc:25:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char *pxstr[3]={"Left","Center","Right"};
data/cups-filters-1.28.5/filter/pdftopdf/pptypes.cc:28:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char *pystr[3]={"Bottom","Center","Top"};
data/cups-filters-1.28.5/filter/pdftopdf/pptypes.cc:36:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *rstr[4]={"0 deg","90 deg","180 deg","270 deg"}; // CCW
data/cups-filters-1.28.5/filter/pdftopdf/pptypes.cc:68:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char *bstr[6]={"None",NULL,"one thin","one thick","two thin","two thick"};
data/cups-filters-1.28.5/filter/pdftopdf/qpdf_cm.cc:14:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(filename,"r");
data/cups-filters-1.28.5/filter/pdftops.c:61:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char			deviceCopies[32] = "1";
data/cups-filters-1.28.5/filter/pdftops.c:63:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char                    make_model[128] = "";
data/cups-filters-1.28.5/filter/pdftops.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];
data/cups-filters-1.28.5/filter/pdftops.c:124:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(filename,"rb")) == 0) {
data/cups-filters-1.28.5/filter/pdftops.c:237:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(filename, "rb");
data/cups-filters-1.28.5/filter/pdftops.c:246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/cups-filters-1.28.5/filter/pdftops.c:305:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		buffer[8192];		/* Copy buffer */
data/cups-filters-1.28.5/filter/pdftops.c:311:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		resolution[128] = "";   /* Output resolution */
data/cups-filters-1.28.5/filter/pdftops.c:333:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		*pdf_argv[100],		/* Arguments for pdftops/gs */
data/cups-filters-1.28.5/filter/pdftops.c:567:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(pstops_end, " Collate");
data/cups-filters-1.28.5/filter/pdftops.c:1101:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open(filename, O_RDONLY)))
data/cups-filters-1.28.5/filter/pdftoraster.cxx:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pageSizeRequested[64];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:133:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char revTable[256] = {
data/cups-filters-1.28.5/filter/pdftoraster.cxx:477:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:492:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      deviceCopies = atoi(p+1);
data/cups-filters-1.28.5/filter/pdftoraster.cxx:843:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char cmyk[4];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:893:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char cmyk[4];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1148:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pixelBuf1[MAX_BYTES_PER_PIXEL];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1149:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pixelBuf2[MAX_BYTES_PER_PIXEL];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1165:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pixelBuf1[MAX_BYTES_PER_PIXEL];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1166:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pixelBuf2[MAX_BYTES_PER_PIXEL];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1182:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pixelBuf1[MAX_BYTES_PER_PIXEL];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1183:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pixelBuf2[MAX_BYTES_PER_PIXEL];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1198:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pixelBuf1[MAX_BYTES_PER_PIXEL];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1199:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char pixelBuf2[MAX_BYTES_PER_PIXEL];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1985:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[BUFSIZ];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1986:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFSIZ];
data/cups-filters-1.28.5/filter/pdftoraster.cxx:2011:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(argv[6],"rb")) == 0) {
data/cups-filters-1.28.5/filter/pdfutils.c:93:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char curdate[250];
data/cups-filters-1.28.5/filter/rastertoescpx.c:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		resolution[PPD_MAX_NAME],
data/cups-filters-1.28.5/filter/rastertoescpx.c:229:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(header->MediaType, "Plain");
data/cups-filters-1.28.5/filter/rastertoescpx.c:380:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      i = atoi(attr->value);
data/cups-filters-1.28.5/filter/rastertoescpx.c:393:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(spec, "%d", header->cupsMediaType);
data/cups-filters-1.28.5/filter/rastertoescpx.c:402:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:412:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:422:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:432:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:442:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:452:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:456:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(spec, "%d", header->MediaPosition);
data/cups-filters-1.28.5/filter/rastertoescpx.c:467:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:493:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:504:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:609:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(spec, "%d", header->CutMedia);
data/cups-filters-1.28.5/filter/rastertoescpx.c:618:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:627:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:637:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:648:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      putchar(atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:765:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    printf("\033U%c", atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:774:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    printf("\033(i\001%c%c", 0, atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:783:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    printf("\033(e\002%c%c%c", 0, 0, atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertoescpx.c:1396:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(comp_ptr, start, count);
data/cups-filters-1.28.5/filter/rastertoescpx.c:1811:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(argv[6], O_RDONLY)) == -1)
data/cups-filters-1.28.5/filter/rastertopclx.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		s[255];			/* Temporary value */
data/cups-filters-1.28.5/filter/rastertopclx.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		resolution[PPD_MAX_NAME],
data/cups-filters-1.28.5/filter/rastertopclx.c:243:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(header->MediaType, "PLAIN");
data/cups-filters-1.28.5/filter/rastertopclx.c:455:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    for (i = atoi(attr->value); i > 0; i --)
data/cups-filters-1.28.5/filter/rastertopclx.c:488:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(s, "%d", header->Duplex);
data/cups-filters-1.28.5/filter/rastertopclx.c:494:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(s, "%d", header->Tumble);
data/cups-filters-1.28.5/filter/rastertopclx.c:521:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(s, "%d", header->Jog);
data/cups-filters-1.28.5/filter/rastertopclx.c:673:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      printf("QM%d", atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertopclx.c:675:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      printf("\033*o%dM", atoi(attr->value));
data/cups-filters-1.28.5/filter/rastertopclx.c:698:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        i = atoi(attr->value);
data/cups-filters-1.28.5/filter/rastertopclx.c:773:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    xorigin = atoi(attr->value);
data/cups-filters-1.28.5/filter/rastertopclx.c:778:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    yorigin = atoi(attr->value);
data/cups-filters-1.28.5/filter/rastertopclx.c:1082:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(comp_ptr, start, count);
data/cups-filters-1.28.5/filter/rastertopclx.c:1188:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(comp_ptr, start, count);
data/cups-filters-1.28.5/filter/rastertopclx.c:1195:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(SeedBuffer + plane * length, line, length);
data/cups-filters-1.28.5/filter/rastertopclx.c:1543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(SeedBuffer, line, length);
data/cups-filters-1.28.5/filter/rastertopclx.c:1859:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(argv[6], O_RDONLY)) == -1)
data/cups-filters-1.28.5/filter/rastertopclx.c:1893:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  job_id = atoi(argv[1]);
data/cups-filters-1.28.5/filter/rastertopclx.c:1914:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    StartPage(ppd, &header, atoi(argv[1]), argv[2], argv[3],
data/cups-filters-1.28.5/filter/rastertopdf.cpp:536:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gamma_str[128];
data/cups-filters-1.28.5/filter/rastertopdf.cpp:537:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bp_str[256];
data/cups-filters-1.28.5/filter/rastertopdf.cpp:538:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char wp_str[256];
data/cups-filters-1.28.5/filter/rastertopdf.cpp:539:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char matrix_str[512];
data/cups-filters-1.28.5/filter/rastertopdf.cpp:1182:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((info->page_data->getBuffer()+(line_n*info->line_bytes)), line, info->line_bytes);
data/cups-filters-1.28.5/filter/rastertopdf.cpp:1188:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((info->pclm_strip_data[strip_num])->getBuffer() + (line_strip*info->line_bytes)),
data/cups-filters-1.28.5/filter/rastertopdf.cpp:1389:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        input = fopen(argv[6], "rb");
data/cups-filters-1.28.5/filter/rastertopdf.cpp:1412:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pdf.pclm_strip_height_preferred = atoi(attr->value);
data/cups-filters-1.28.5/filter/rastertopdf.cpp:1425:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          pdf.pclm_strip_height_supported.push_back(atoi(vec[i].c_str()));
data/cups-filters-1.28.5/filter/rastertops.c:228:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  in[header.cupsBytesPerLine * 6],  /* Input data buffer */
data/cups-filters-1.28.5/filter/rastertops.c:258:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(convertedpix, pixdata, header.cupsBytesPerLine);
data/cups-filters-1.28.5/filter/rastertops.c:267:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(in, convertedpix, alloc);
data/cups-filters-1.28.5/filter/rastertops.c:420:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    input = fopen(argv[6], "rb");
data/cups-filters-1.28.5/filter/sys5ippprinter.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		buffer[8192];		/* Copy buffer */
data/cups-filters-1.28.5/filter/sys5ippprinter.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	        *argv_nt[8];		/* NULL-terminated array of the command
data/cups-filters-1.28.5/filter/sys5ippprinter.c:492:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		filter_path[1024];	/* Path to filter executable */
data/cups-filters-1.28.5/filter/sys5ippprinter.c:544:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        infd = open("/dev/null", O_RDONLY);
data/cups-filters-1.28.5/filter/sys5ippprinter.c:556:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        outfd = open("/dev/null", O_WRONLY);
data/cups-filters-1.28.5/filter/sys5ippprinter.c:568:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fd = open("/dev/null", O_RDWR)) > 2)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:578:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open("/dev/null", O_RDWR)) > 3)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:587:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open("/dev/null", O_RDWR)) > 4)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:620:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		program[1024];		/* Program to run */
data/cups-filters-1.28.5/filter/sys5ippprinter.c:861:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(result, p1, p2 - p1);
data/cups-filters-1.28.5/filter/textcommon.c:494:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		keyword[64],	/* Keyword string */
data/cups-filters-1.28.5/filter/textcommon.c:533:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(argv[6], "rb")) == NULL)
data/cups-filters-1.28.5/filter/textcommon.c:606:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    PageColumns = atoi(val);
data/cups-filters-1.28.5/filter/textcommon.c:685:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  Copies = atoi(argv[4]);
data/cups-filters-1.28.5/filter/texttopdf.c:132:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char	Codes[65536];	/* Unicode glyph mapping to font */
data/cups-filters-1.28.5/filter/texttopdf.c:282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		filename[1024];	/* Glyph filenames */
data/cups-filters-1.28.5/filter/texttopdf.c:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		line[1024],	/* Line from file */
data/cups-filters-1.28.5/filter/texttopdf.c:294:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		curdate[255];	/* Current date (text format) */
data/cups-filters-1.28.5/filter/texttopdf.c:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		*fontnames[1024];	/* Unique fonts */
data/cups-filters-1.28.5/filter/texttopdf.c:382:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(filename, "r")) == NULL)
data/cups-filters-1.28.5/filter/texttopdf.c:1196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[20];
data/cups-filters-1.28.5/filter/texttotext.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		buffer[8192];		/* Copy buffer */
data/cups-filters-1.28.5/filter/texttotext.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          encoding[64];           /* The printer'a encoding, to which
data/cups-filters-1.28.5/filter/texttotext.c:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          outbuf[4096];           /* Output buffer for iconv */
data/cups-filters-1.28.5/filter/texttotext.c:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          inbuf[2048];            /* Input buffer for iconv */
data/cups-filters-1.28.5/filter/texttotext.c:246:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  num_copies = atoi(argv[4]);
data/cups-filters-1.28.5/filter/texttotext.c:288:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      num_lines = atoi(val2);
data/cups-filters-1.28.5/filter/texttotext.c:297:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      num_columns = atoi(val2);
data/cups-filters-1.28.5/filter/texttotext.c:314:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    i = atoi(val);
data/cups-filters-1.28.5/filter/texttotext.c:322:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    i = atoi(val);
data/cups-filters-1.28.5/filter/texttotext.c:339:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    page_left = atoi(val);
data/cups-filters-1.28.5/filter/texttotext.c:352:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    page_right = atoi(val);
data/cups-filters-1.28.5/filter/texttotext.c:365:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    page_top = atoi(val);
data/cups-filters-1.28.5/filter/texttotext.c:378:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    page_bottom = atoi(val);
data/cups-filters-1.28.5/filter/texttotext.c:393:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(encoding, "ASCII//IGNORE");
data/cups-filters-1.28.5/filter/texttotext.c:433:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    i = atoi(val);
data/cups-filters-1.28.5/filter/texttotext.c:575:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(filename, O_RDONLY);
data/cups-filters-1.28.5/filter/urftopdf.cpp:255:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((info->page_data->getBuffer()+(line_n*info->line_bytes)), line, info->line_bytes);
data/cups-filters-1.28.5/filter/urftopdf.cpp:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char unirast[8];
data/cups-filters-1.28.5/filter/urftopdf.cpp:430:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        input = fopen(argv[6], "rb");
data/cups-filters-1.28.5/fontembed/embed.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];
data/cups-filters-1.28.5/fontembed/embed_pdf.c:47:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[128*3];
data/cups-filters-1.28.5/fontembed/embed_pdf.c:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char subtag[7];
data/cups-filters-1.28.5/fontembed/embed_pdf.h:25:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[1]; // used for storing e.g. >fontname
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:45:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fontname[64];
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:137:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret->panose,os2+30,12); // sFamilyClass + panose
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:347:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char ret[256];
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:349:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret,(const char *)pos+1,len);
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:381:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ret[255];
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[256];
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:433:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(tmp+iA,"00>\n<");
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:450:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[100];
data/cups-filters-1.28.5/fontembed/embed_sfnt.c:453:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    const int l=sprintf(tmp,"%d RD ",maxlen);
data/cups-filters-1.28.5/fontembed/main.c:91:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *f=fopen(outfile,"w");
data/cups-filters-1.28.5/fontembed/sfnt.c:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4];
data/cups-filters-1.28.5/fontembed/sfnt.c:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/cups-filters-1.28.5/fontembed/sfnt.c:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/cups-filters-1.28.5/fontembed/sfnt.c:286:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f=fopen(file,"rb"))==NULL) {
data/cups-filters-1.28.5/fontembed/sfnt.c:299:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f=fopen(end,"rb");
data/cups-filters-1.28.5/fontembed/sfnt.c:315:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[12];
data/cups-filters-1.28.5/fontembed/sfnt.c:380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[12];
data/cups-filters-1.28.5/fontembed/sfnt.c:688:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[8];
data/cups-filters-1.28.5/fontembed/sfnt.c:841:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pad[4]={0,0,0,0};
data/cups-filters-1.28.5/fontembed/sfnt.c:847:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pad,data+ret-4,ret-length);
data/cups-filters-1.28.5/fontembed/sfnt_subset.c:182:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_glyf+offset,otf->gly,len);
data/cups-filters-1.28.5/fontembed/sfnt_subset.c:265:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];
data/cups-filters-1.28.5/fontembed/test_pdf.c:92:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen("test.pdf","w");
data/cups-filters-1.28.5/fontembed/test_ps.c:65:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen("test.ps","w");
data/cups-filters-1.28.5/scripting/php/phpcups.c:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		temp[255];		/* String value for numbers */
data/cups-filters-1.28.5/scripting/php/phpcups.c:101:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(temp, "%ld", Z_LVAL_P(value));
data/cups-filters-1.28.5/scripting/php/phpcups.c:107:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(temp, "%g", Z_DVAL_P(value));
data/cups-filters-1.28.5/scripting/php/phpcups.c:443:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char	*files[1000];		/* Files */
data/cups-filters-1.28.5/utils/cups-browsed.c:439:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char local_server_str[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:497:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cachedir[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:498:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char logdir[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:499:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char local_default_printer_file[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:500:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char remote_default_printer_file[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:501:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char save_options_file[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:502:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char debug_log_file[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:503:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char debug_log_file_bckp[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:695:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    lfp = fopen(debug_log_file, "a+");
data/cups-filters-1.28.5/utils/cups-browsed.c:715:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* fp = fopen(debug_log_file, "r"); 
data/cups-filters-1.28.5/utils/cups-browsed.c:745:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/cups-filters-1.28.5/utils/cups-browsed.c:767:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *fp1 = fopen(debug_log_file, "r");
data/cups-filters-1.28.5/utils/cups-browsed.c:768:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE *fp2 = fopen(debug_log_file_bckp, "w");
data/cups-filters-1.28.5/utils/cups-browsed.c:772:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      lfp = fopen(debug_log_file, "w");
data/cups-filters-1.28.5/utils/cups-browsed.c:781:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/cups-filters-1.28.5/utils/cups-browsed.c:1166:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newsize, size, sizeof(cups_size_t));
data/cups-filters-1.28.5/utils/cups-browsed.c:1414:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char    *values[num_value];
data/cups-filters-1.28.5/utils/cups-browsed.c:1486:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char    *values[num_value];
data/cups-filters-1.28.5/utils/cups-browsed.c:1557:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char    *values[num_value];
data/cups-filters-1.28.5/utils/cups-browsed.c:1615:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(str,"%d",value);
data/cups-filters-1.28.5/utils/cups-browsed.c:1628:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        values[i] = atoi(q);
data/cups-filters-1.28.5/utils/cups-browsed.c:1678:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(str,"%d",value);
data/cups-filters-1.28.5/utils/cups-browsed.c:1691:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        values[i] = atoi(q);
data/cups-filters-1.28.5/utils/cups-browsed.c:1877:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 media_source[32], media_type[32];
data/cups-filters-1.28.5/utils/cups-browsed.c:2069:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                    ppdname[41];
data/cups-filters-1.28.5/utils/cups-browsed.c:2100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                    ppdname[41];
data/cups-filters-1.28.5/utils/cups-browsed.c:2101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                    requested_option[30];
data/cups-filters-1.28.5/utils/cups-browsed.c:2104:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(requested_option, "media-type-supported");
data/cups-filters-1.28.5/utils/cups-browsed.c:2106:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(requested_option, "media-source-supported");
data/cups-filters-1.28.5/utils/cups-browsed.c:2108:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(requested_option, "output-bin-supported");
data/cups-filters-1.28.5/utils/cups-browsed.c:2469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                    requested_option[40];
data/cups-filters-1.28.5/utils/cups-browsed.c:2472:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(requested_option, "print-content-optimize-supported");
data/cups-filters-1.28.5/utils/cups-browsed.c:2474:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(requested_option, "print-rendering-intent-supported");
data/cups-filters-1.28.5/utils/cups-browsed.c:2476:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(requested_option, "print-scaling-supported");
data/cups-filters-1.28.5/utils/cups-browsed.c:2478:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(requested_option, "job-sheets-supported");
data/cups-filters-1.28.5/utils/cups-browsed.c:2683:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 ppdname[41], pagesize[128];
data/cups-filters-1.28.5/utils/cups-browsed.c:2749:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 *opt1, *opt2, constraint[100], *ppdsizename, *temp;
data/cups-filters-1.28.5/utils/cups-browsed.c:2869:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 printer_make_and_model[256];
data/cups-filters-1.28.5/utils/cups-browsed.c:2872:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                 valuebuffer[65536];
data/cups-filters-1.28.5/utils/cups-browsed.c:2882:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(printer_make_and_model, "Cluster ");
data/cups-filters-1.28.5/utils/cups-browsed.c:2957:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                    media_source[32], media_type[32];
data/cups-filters-1.28.5/utils/cups-browsed.c:2966:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                    ppdname[41];
data/cups-filters-1.28.5/utils/cups-browsed.c:3233:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                  uri[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:3646:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    lhost[HTTP_MAX_URI],     /* Local printer: Hostname */
data/cups-filters-1.28.5/utils/cups-browsed.c:3739:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:3848:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:4383:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    ldap_protocol[11],    /* LDAP protocol */
data/cups-filters-1.28.5/utils/cups-browsed.c:4633:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    uri[HTTP_MAX_URI],            /* Printer URI */
data/cups-filters-1.28.5/utils/cups-browsed.c:5258:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:5286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:5318:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:5433:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(filename, "w+");
data/cups-filters-1.28.5/utils/cups-browsed.c:5452:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *p, buf[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:5455:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(filename, "r");
data/cups-filters-1.28.5/utils/cups-browsed.c:5474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:5490:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:5493:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempfile[1024] = "";
data/cups-filters-1.28.5/utils/cups-browsed.c:5519:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:5521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI], *resource;
data/cups-filters-1.28.5/utils/cups-browsed.c:5525:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[65536], *c;
data/cups-filters-1.28.5/utils/cups-browsed.c:5664:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(filename, "w+");
data/cups-filters-1.28.5/utils/cups-browsed.c:5689:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:5705:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(filename, "r");
data/cups-filters-1.28.5/utils/cups-browsed.c:6039:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *ptr, buf[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:6138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:6147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char destination_uri[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:6151:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:6159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         resolution[32];
data/cups-filters-1.28.5/utils/cups-browsed.c:6481:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(document_format, "pdf");
data/cups-filters-1.28.5/utils/cups-browsed.c:6484:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(document_format, "apple-raster");
data/cups-filters-1.28.5/utils/cups-browsed.c:6487:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(document_format, "raster");
data/cups-filters-1.28.5/utils/cups-browsed.c:6490:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(document_format, "pclm");
data/cups-filters-1.28.5/utils/cups-browsed.c:6493:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(document_format, "pclxl");
data/cups-filters-1.28.5/utils/cups-browsed.c:6496:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(document_format, "postscript");
data/cups-filters-1.28.5/utils/cups-browsed.c:6500:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(document_format, "pcl");
data/cups-filters-1.28.5/utils/cups-browsed.c:6688:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          local_queue_uri[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:6824:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          local_queue_uri[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:7088:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char valuebuffer[65536];
data/cups-filters-1.28.5/utils/cups-browsed.c:7611:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          uri[HTTP_MAX_URI], device_uri[HTTP_MAX_URI], buf[1024],
data/cups-filters-1.28.5/utils/cups-browsed.c:7624:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          tempfile[1024];  /* Temporary file */
data/cups-filters-1.28.5/utils/cups-browsed.c:7625:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          buffer[8192];  /* Buffer for creating script */
data/cups-filters-1.28.5/utils/cups-browsed.c:7638:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          keyword[1024], *keyptr;
data/cups-filters-1.28.5/utils/cups-browsed.c:9006:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[10];
data/cups-filters-1.28.5/utils/cups-browsed.c:9146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *host, buf[HTTP_MAX_HOST], *p, list[65536], *l;
data/cups-filters-1.28.5/utils/cups-browsed.c:9268:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&iface->broadcast, ifa->ifa_broadaddr,
data/cups-filters-1.28.5/utils/cups-browsed.c:9295:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&iface->broadcast, ifa->ifa_broadaddr,
data/cups-filters-1.28.5/utils/cups-browsed.c:9405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:9414:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char service_host_name[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:9995:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ifname[IF_NAMESIZE];
data/cups-filters-1.28.5/utils/cups-browsed.c:10113:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char *p, instance[64];
data/cups-filters-1.28.5/utils/cups-browsed.c:10261:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ifname[IF_NAMESIZE];
data/cups-filters-1.28.5/utils/cups-browsed.c:10583:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char scheme[32];
data/cups-filters-1.28.5/utils/cups-browsed.c:10584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username[64];
data/cups-filters-1.28.5/utils/cups-browsed.c:10585:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[HTTP_MAX_HOST];
data/cups-filters-1.28.5/utils/cups-browsed.c:10586:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resource[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:10589:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char local_resource[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:10590:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char service_name[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:10677:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char packet[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:10683:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char remote_host[256];
data/cups-filters-1.28.5/utils/cups-browsed.c:10684:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:10685:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char location[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:10686:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char info[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:10788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char packet[2048];
data/cups-filters-1.28.5/utils/cups-browsed.c:10789:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uri[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:10790:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char scheme[32];
data/cups-filters-1.28.5/utils/cups-browsed.c:10791:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char username[64];
data/cups-filters-1.28.5/utils/cups-browsed.c:10792:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[HTTP_MAX_HOST];
data/cups-filters-1.28.5/utils/cups-browsed.c:10794:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resource[HTTP_MAX_URI];
data/cups-filters-1.28.5/utils/cups-browsed.c:11436:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[HTTP_MAX_BUFFER];
data/cups-filters-1.28.5/utils/cups-browsed.c:11445:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[1024];
data/cups-filters-1.28.5/utils/cups-browsed.c:11698:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int t = atoi(value);
data/cups-filters-1.28.5/utils/cups-browsed.c:11717:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int t = atoi(value);
data/cups-filters-1.28.5/utils/cups-browsed.c:11730:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int t = atoi(value);
data/cups-filters-1.28.5/utils/cups-browsed.c:11836:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int val = atoi(value);
data/cups-filters-1.28.5/utils/cups-browsed.c:11980:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int t = atoi(value);
data/cups-filters-1.28.5/utils/cups-browsed.c:12006:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int n = atoi(value);
data/cups-filters-1.28.5/utils/cups-browsed.c:12018:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int t = atoi(value);
data/cups-filters-1.28.5/utils/cups-browsed.c:12233:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int t = atoi(val);
data/cups-filters-1.28.5/utils/driverless.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	buffer[8192],		/* Copy buffer */
data/cups-filters-1.28.5/utils/driverless.c:272:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(make, model, (size_t)(ptr - model));
data/cups-filters-1.28.5/utils/driverless.c:399:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		*ippfind_argv[100];	/* Arguments for ippfind */
data/cups-filters-1.28.5/utils/driverless.c:406:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		*ptr,
data/cups-filters-1.28.5/utils/driverless.c:630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[65536], ppdname[1024];
data/cups-filters-1.28.5/utils/driverless.c:689:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(ppdname, O_RDONLY);
data/cups-filters-1.28.5/backend/beh.c:181:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(tmpfilename) > 0)
data/cups-filters-1.28.5/backend/beh.c:225:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(scheme, uri, sizeof(scheme) - 1);
data/cups-filters-1.28.5/backend/beh.c:226:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(uri) > 1023)
data/cups-filters-1.28.5/backend/cups-brf.c:93:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(0077);
data/cups-filters-1.28.5/backend/cups-brf.c:138:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    sizein = read(STDIN_FILENO, buffer, sizeof(buffer));
data/cups-filters-1.28.5/backend/ieee1284.c:137:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		 uri + strlen(uri) - 1);
data/cups-filters-1.28.5/backend/ieee1284.c:165:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((length = read(devparportfd, device_id,
data/cups-filters-1.28.5/backend/ieee1284.c:346:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(temp, make_model, sizeof(temp) - 1);
data/cups-filters-1.28.5/backend/ieee1284.c:358:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!_cups_strncasecmp(mdl, mfg, strlen(mfg)))
data/cups-filters-1.28.5/backend/ieee1284.c:360:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      mdl += strlen(mfg);
data/cups-filters-1.28.5/backend/ieee1284.c:433:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!mfg || !_cups_strncasecmp(mdl, mfg, strlen(mfg)))
data/cups-filters-1.28.5/backend/ieee1284.c:466:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(des) >= 8)
data/cups-filters-1.28.5/backend/ieee1284.c:495:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(make_model, "Unknown", make_model_size - 1);
data/cups-filters-1.28.5/backend/ieee1284.c:625:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer, make_and_model + 1, bufsize - 1);
data/cups-filters-1.28.5/backend/ieee1284.c:699:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer, make_and_model, bufsize - 1);
data/cups-filters-1.28.5/backend/ieee1284.c:726:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(buffer + 2, buffer + 18, strlen(buffer + 18) + 1);
data/cups-filters-1.28.5/backend/ieee1284.c:736:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(buffer + 2, buffer + 15, strlen(buffer + 15) + 1);
data/cups-filters-1.28.5/backend/ieee1284.c:744:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(buffer + 8, buffer + 21, strlen(buffer + 21) + 1);
data/cups-filters-1.28.5/backend/ieee1284.c:767:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(buffer + 4, buffer + 8, strlen(buffer + 8) + 1);
data/cups-filters-1.28.5/backend/ieee1284.c:774:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (bufptr = buffer + strlen(buffer) - 1;
data/cups-filters-1.28.5/backend/implicitclass.c:204:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strncmp(ptr1, job_id, strlen(job_id)) != 0)
data/cups-filters-1.28.5/backend/implicitclass.c:206:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ptr1 += strlen(job_id);
data/cups-filters-1.28.5/backend/implicitclass.c:218:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep(500000);
data/cups-filters-1.28.5/backend/implicitclass.c:227:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(dest_host,ptr1,sizeof(dest_host) - 1);
data/cups-filters-1.28.5/backend/implicitclass.c:283:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(printer_uri, ptr1, sizeof(printer_uri) - 1);
data/cups-filters-1.28.5/backend/implicitclass.c:284:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(document_format, ptr3, sizeof(document_format) - 1);
data/cups-filters-1.28.5/backend/implicitclass.c:285:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(resolution, ptr4, sizeof(resolution) - 1);
data/cups-filters-1.28.5/backend/implicitclass.c:311:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      argv_nt[0] = calloc(strlen(printer_uri) + 8, sizeof(char));
data/cups-filters-1.28.5/backend/implicitclass.c:317:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      outbuflen = strlen(argv[5]) + 256;
data/cups-filters-1.28.5/backend/parallel.c:320:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((print_bytes = read(print_fd, print_buffer,
data/cups-filters-1.28.5/backend/parallel.c:682:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((bc_bytes = read(device_fd, bc_buffer, sizeof(bc_buffer))) > 0)
data/cups-filters-1.28.5/backend/parallel.c:703:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((print_bytes = read(print_fd, print_buffer,
data/cups-filters-1.28.5/backend/parallel.c:850:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  datalen = strlen(data);
data/cups-filters-1.28.5/backend/serial.c:560:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((bc_bytes = read(device_fd, bc_buffer, sizeof(bc_buffer))) > 0)
data/cups-filters-1.28.5/backend/serial.c:574:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((print_bytes = read(print_fd, print_buffer, print_size)) < 0)
data/cups-filters-1.28.5/backend/serial.c:639:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100000);
data/cups-filters-1.28.5/backend/serial.c:742:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((print_bytes = read(print_fd, print_buffer,
data/cups-filters-1.28.5/cupsfilters/colormanager.c:332:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(full_path, attr->value, sizeof(full_path) - 1);
data/cups-filters-1.28.5/cupsfilters/colormanager.c:333:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(attr->value) > 1023)
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:88:3:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  getc(fp);		/* Skip "BM" sync chars */
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:89:3:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:157:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:215:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	      byte = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:241:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:262:3:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:265:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	      if ((count = getc(fp)) == 0)
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:267:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((count = getc(fp)) == 0)
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:290:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		  count = getc(fp) * getc(fp) * img->xsize;
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:290:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		  count = getc(fp) * getc(fp) * img->xsize;
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:304:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	        color = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:316:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		temp = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:361:3:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:364:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	      if ((count = getc(fp)) == 0)
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:366:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if ((count = getc(fp)) == 0)
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:389:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		  count = getc(fp) * getc(fp) * img->xsize;
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:389:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		  count = getc(fp) * getc(fp) * img->xsize;
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:403:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	        color = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:411:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	      temp = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:430:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    ptr[2] = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:431:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    ptr[1] = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:432:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    ptr[0] = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:440:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:496:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b0 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:497:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b1 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:512:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b0 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:513:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b1 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:514:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b2 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:515:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b3 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:530:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b0 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:531:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b1 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:532:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b2 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-bmp.c:533:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  b3 = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-gif.c:114:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    switch (getc(fp))
data/cups-filters-1.28.5/cupsfilters/image-gif.c:121:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          buf[0] = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-gif.c:273:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((count = getc(fp)) == EOF)
data/cups-filters-1.28.5/cupsfilters/image-gif.c:466:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  code_size = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-photocd.c:67:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  rotation = (getc(fp) & 63) != 8;
data/cups-filters-1.28.5/cupsfilters/image-pix.c:127:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          count = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-pix.c:128:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  g     = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-pix.c:167:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          count = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-pix.c:168:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  b     = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-pix.c:169:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  g     = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-pix.c:170:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  r     = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-pix.c:228:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ch = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-pix.c:229:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ((ch << 8) | getc(fp));
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:139:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            *row = getc(sgip->file);
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:231:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        sgip->comp  = getc(sgip->file);
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:232:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        sgip->bpp   = getc(sgip->file);
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:629:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((ch = getc(fp)) == EOF)
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:641:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  *row = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-sgilib.c:645:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ch = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-sun.c:208:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          run_value = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-sun.c:212:25:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            run_count = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-sun.c:216:32:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              run_value = *p = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-sun.c:398:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  v = getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-sun.c:399:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  v = (v << 8) | getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-sun.c:400:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  v = (v << 8) | getc(fp);
data/cups-filters-1.28.5/cupsfilters/image-sun.c:401:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  v = (v << 8) | getc(fp);
data/cups-filters-1.28.5/cupsfilters/image.c:577:13:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    switch (sscanf(cache_env, "%d%254s", &max_size, cache_units))
data/cups-filters-1.28.5/cupsfilters/image.c:768:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read(img->cachefile, ic->pixels,
data/cups-filters-1.28.5/cupsfilters/ipp.c:51:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (int i = 0; i<strlen(a); i++)
data/cups-filters-1.28.5/cupsfilters/ipp.c:63:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  vsnprintf(log + strlen(log),
data/cups-filters-1.28.5/cupsfilters/ipp.c:64:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    LOGSIZE - strlen(log) - 1,
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:99:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p1 = p2 + strlen(option);
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:112:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(p2, p1, strlen(buf) - (p1 - buf) + 1);
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:118:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p1 = buf + strlen(buf);
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:253:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  optbuflen = strlen(argv[5]) + 256;
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:727:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(program, filter, sizeof(program) - 1);
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:728:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(filter) > 1023)
data/cups-filters-1.28.5/cupsfilters/pdftoippprinter.c:895:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p2 = p1 + strlen(option);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:189:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  srclen = strlen(src);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:229:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (tempptr = temp + strlen(temp) - 1;
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:239:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    declen = (int)strlen(dec);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:271:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufptr = buf + strlen(buf);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:484:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(lang, c1, i);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:494:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(c2) < 10 || strncmp(c2, "cups_", 5) != 0 ||
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:496:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    strcmp(c2 + strlen(c2) - 3, ".po"))
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:878:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(start) > 0) /* Option name found */
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:884:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (sep && strlen(sep) > 0) /* Choice name found */
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:929:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(start) == 0) continue;
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:934:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 (strlen(human_readable) +
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:935:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  strlen(start) + 2));
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:936:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr = human_readable + strlen(human_readable);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:938:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strlcpy(ptr + 1, start, strlen(start) + 1);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:941:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(strlen(start) + 1));
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:942:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strlcpy(human_readable, start, strlen(start) + 1);
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1459:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    snprintf(temp2->media + strlen(temp2->media),
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1460:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     sizeof(temp2->media) - strlen(temp2->media),
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1466:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      snprintf(temp2->media + strlen(temp2->media),
data/cups-filters-1.28.5/cupsfilters/ppdgenerator.c:1467:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       sizeof(temp2->media) - strlen(temp2->media),
data/cups-filters-1.28.5/cupsfilters/raster.c:50:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  srclen = strlen(src);
data/cups-filters-1.28.5/cupsfilters/raster.c:172:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(h->MediaClass, "");
data/cups-filters-1.28.5/filter/banner.c:118:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = malloc(strlen(BANNERTOPDF_DATADIR) + strlen(name) + 2);
data/cups-filters-1.28.5/filter/banner.c:118:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = malloc(strlen(BANNERTOPDF_DATADIR) + strlen(name) + 2);
data/cups-filters-1.28.5/filter/banner.c:121:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = malloc(strlen(datadir) + strlen(name) + 7);
data/cups-filters-1.28.5/filter/banner.c:121:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = malloc(strlen(datadir) + strlen(name) + 7);
data/cups-filters-1.28.5/filter/bannertopdf.c:237:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( !strlen(key) || !strlen(val) ) {
data/cups-filters-1.28.5/filter/bannertopdf.c:237:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( !strlen(key) || !strlen(val) ) {
data/cups-filters-1.28.5/filter/bannertopdf.c:486:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen (buf);
data/cups-filters-1.28.5/filter/commandtoescpx.c:117:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lineptr = line + strlen(line) - 1;
data/cups-filters-1.28.5/filter/commandtopclx.c:104:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lineptr = line + strlen(line) - 1;
data/cups-filters-1.28.5/filter/common.c:585:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = 5 + strlen(name);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:762:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(job->copies, "1");
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:870:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(job->ppdfile, getenv("PPD"), sizeof(job->ppdfile) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:871:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(getenv("PPD")) > 2047)
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:875:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(cupsfilterpath, getenv("CUPS_SERVERBIN"),
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:877:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(getenv("CUPS_SERVERBIN")) > PATH_MAX-1)
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:898:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(job->ppdfile, str, sizeof(job->ppdfile) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:899:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(str) > 2047)
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:904:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	        strncpy(job->ppdfile, str, sizeof(job->ppdfile) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:905:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	        if (strlen(str) > 2047)
data/cups-filters-1.28.5/filter/foomatic-rip/foomaticrip.c:999:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (spooler == SPOOLER_CUPS && job->printer && strlen(job->printer) > 0) {
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:565:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(str);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:624:13:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
        n = sscanf(str, "%fx%f%2s", &width, &height, unit);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1113:15:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    matches = sscanf(str, "%31s %31s %c %lf", type, style, &opt->spot, &order);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1257:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if ((l == 0) || (l > strlen(repl)))
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1258:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    l = strlen(repl);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1260:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(pdest, repl, s);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1363:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(cmd) + 50;
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1380:9:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
    n = sscanf(str, "%d%15s%19s%19s",
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1586:9:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
        sscanf(line, "*%127s%*[ \t]%63[^ \t/=)]%*1[/=]%63[^\n]", key, name, text);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1591:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        value->len = strlen(value->data);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1714:13:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
            sscanf(value->data, "%19s %19s", param->min, param->max);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1720:13:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
            sscanf(value->data, "%19s", param->max);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1737:13:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
            sscanf(value->data, "%lf %63s *%63s", &order, text, name);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1914:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(cmd_pdf, cmd, 4096);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:1915:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(cmd) > 4095)
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:2027:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s = malloc(strlen(opt->name) + strlen(userval) + 20);
data/cups-filters-1.28.5/filter/foomatic-rip/options.c:2027:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s = malloc(strlen(opt->name) + strlen(userval) + 20);
data/cups-filters-1.28.5/filter/foomatic-rip/postscript.c:162:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c = fgetc(s->file)) != EOF) {
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:148:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c = fgetc(stream)) != EOF) {
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:215:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p1 = j1 + strlen(j1);
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:223:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p2 = j2 + strlen(j2);
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:305:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(header, original_opts[0], p - original_opts[0]);
data/cups-filters-1.28.5/filter/foomatic-rip/renderer.c:371:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(jclstr, jclprepend[0], pos);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:54:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(path, getenv("CUPS_FONTPATH"), PATH_MAX - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:56:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       strncpy(path, getenv("CUPS_DATADIR"), PATH_MAX - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:57:8:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
       strncat(path, "/fonts", PATH_MAX - strlen(path) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:57:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       strncat(path, "/fonts", PATH_MAX - strlen(path) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:60:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
        strncat(path, ":", PATH_MAX - strlen(path) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:60:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(path, ":", PATH_MAX - strlen(path) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:61:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(path, getenv("GS_LIB"), PATH_MAX - strlen(path) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:61:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(path, getenv("GS_LIB"), PATH_MAX - strlen(path) - 1);
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:72:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cups_options_len = strlen(arglist_get(arglist, 4));
data/cups-filters-1.28.5/filter/foomatic-rip/spooler.c:100:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(job->printer, pname, 256);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:67:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strncmp(str, prefix, strlen(prefix));
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:72:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strncasecmp(str, prefix, strlen(prefix));
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:77:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return str ? (strncmp(str, prefix, strlen(prefix)) == 0) : 0;
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:82:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int slen = strlen(str);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:83:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int plen = strlen(postfix);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:202:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(src) + len;
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:447:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(s, string, len);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:546:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *end = tok + strlen(tok) - copy;
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:608:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    srclen = strlen(src);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:630:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ds->data, src, n);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:646:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(&ds->data[ds->len], src, n);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:686:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t srclen = strlen(src);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:736:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c = fgetc(stream)) != EOF) {
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:767:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        dstrcatf(ds, "%s", p + strlen(find));
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:786:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(str);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:801:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ds->data, copy, idx);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:862:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(str);
data/cups-filters-1.28.5/filter/foomatic-rip/util.c:1078:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p = &((char*)i->data)[strlen(name)];
data/cups-filters-1.28.5/filter/getline.c:69:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      register int c = getc (stream);
data/cups-filters-1.28.5/filter/gstoraster.c:557:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(full_path, attr->value, sizeof(full_path));
data/cups-filters-1.28.5/filter/gstoraster.c:672:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((n = read(0,buf,BUFSIZ)) > 0) {
data/cups-filters-1.28.5/filter/imagetopdf.c:31:52:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error Installed libs and specified source Version mismatch \
data/cups-filters-1.28.5/filter/imagetopdf.c:37:52:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error Installed libs and specified source Version mismatch \
data/cups-filters-1.28.5/filter/imagetopdf.c:157:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = strlen(attr->value);
data/cups-filters-1.28.5/filter/imagetopdf.c:268:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  unsigned long len = strlen(str);
data/cups-filters-1.28.5/filter/imagetopdf.c:748:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(filename, argv[6], sizeof(filename) - 1);
data/cups-filters-1.28.5/filter/imagetopdf.c:1573:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const size_t size = strlen(attr->value) + 1 + 30;
data/cups-filters-1.28.5/filter/imagetoraster.c:249:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(filename, argv[6], sizeof(filename) - 1);
data/cups-filters-1.28.5/filter/mupdftoraster.c:292:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((n = read(0,buf,BUFSIZ)) > 0) {
data/cups-filters-1.28.5/filter/mupdftoraster.c:317:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(infilename, argv[6], sizeof(infilename) - 1);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:709:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     strlen(final_content_type))) {
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:721:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     strlen(final_content_type))) {
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:732:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  char *q = p + strlen(p) - 1;
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:756:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  } else if (!strcasecmp(lastfilter + strlen(lastfilter) - 8,
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf.cc:887:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((n=read(0,buf,BUFSIZ)) > 0) {
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_jcl.cc:23:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int n=strlen(attr->value);
data/cups-filters-1.28.5/filter/pdftopdf/pdftopdf_jcl.cc:149:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const size_t size=strlen(attr->value)+1+30;
data/cups-filters-1.28.5/filter/pdftops.c:143:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(deviceCopies, p, sizeof(deviceCopies));
data/cups-filters-1.28.5/filter/pdftops.c:145:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      p = deviceCopies + strlen(deviceCopies) - 1;
data/cups-filters-1.28.5/filter/pdftops.c:186:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (!option_start[strlen(*option)] ||
data/cups-filters-1.28.5/filter/pdftops.c:187:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          isspace(option_start[strlen(*option)] & 255) ||
data/cups-filters-1.28.5/filter/pdftops.c:188:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          option_start[strlen(*option)] == '=')
data/cups-filters-1.28.5/filter/pdftops.c:194:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        option_end = option_start + strlen(*option);
data/cups-filters-1.28.5/filter/pdftops.c:220:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memmove(option_start, option_end, strlen(option_end) + 1);
data/cups-filters-1.28.5/filter/pdftops.c:451:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(make_model, val, sizeof(make_model) - 1);
data/cups-filters-1.28.5/filter/pdftops.c:452:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(val) > 127)
data/cups-filters-1.28.5/filter/pdftops.c:461:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    make_model[strlen(make_model) - 1] = '\0';
data/cups-filters-1.28.5/filter/pdftops.c:561:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pstops_options = realloc(pstops_options, strlen(pstops_options) + 9);
data/cups-filters-1.28.5/filter/pdftops.c:566:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pstops_end = pstops_options + strlen(pstops_options);
data/cups-filters-1.28.5/filter/pdftops.c:817:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(resolution, choice->choice, sizeof(resolution));
data/cups-filters-1.28.5/filter/pdftops.c:819:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(resolution, attr->value, sizeof(resolution));
data/cups-filters-1.28.5/filter/pdftoraster.cxx:470:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pageSizeRequested, header.cupsPageSizeName, 64);
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1737:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(header.cupsPageSizeName, size->name, 64);
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1784:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(header.cupsPageSizeName, size->name, 64);
data/cups-filters-1.28.5/filter/pdftoraster.cxx:1996:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((n = read(0,buf,BUFSIZ)) > 0) {
data/cups-filters-1.28.5/filter/pdfutils.c:37:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len=strlen(str);
data/cups-filters-1.28.5/filter/pdfutils.c:68:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len=strlen(str);
data/cups-filters-1.28.5/filter/strcasestr.c:52:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(find);
data/cups-filters-1.28.5/filter/sys5ippprinter.c:212:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  optbuflen = strlen(argv[5]) + 256;
data/cups-filters-1.28.5/filter/sys5ippprinter.c:664:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(program, filter, sizeof(program) - 1);
data/cups-filters-1.28.5/filter/sys5ippprinter.c:665:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(filter) > 1023)
data/cups-filters-1.28.5/filter/sys5ippprinter.c:849:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p2 = p1 + strlen(option);
data/cups-filters-1.28.5/filter/sys5ippprinter.c:891:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p1 = p2 + strlen(option);
data/cups-filters-1.28.5/filter/sys5ippprinter.c:896:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(p2, p1, strlen(buf) - (buf - p1) + 1);
data/cups-filters-1.28.5/filter/sys5ippprinter.c:902:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p1 = buf + strlen(buf);
data/cups-filters-1.28.5/filter/test_pdf1.c:34:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    ,cobj,strlen(buf),buf);
data/cups-filters-1.28.5/filter/textcommon.c:801:27:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((nextch = getc(fp)) != 0x0a)
data/cups-filters-1.28.5/filter/textcommon.c:1246:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ((ch = getc(fp)) == EOF)
data/cups-filters-1.28.5/filter/textcommon.c:1257:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((next = getc(fp)) == EOF)
data/cups-filters-1.28.5/filter/textcommon.c:1268:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((next = getc(fp)) == EOF)
data/cups-filters-1.28.5/filter/textcommon.c:1273:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((next = getc(fp)) == EOF)
data/cups-filters-1.28.5/filter/texttopdf.c:423:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    line[strlen(line) - 1] = '\0'; /* Drop \n */
data/cups-filters-1.28.5/filter/texttopdf.c:970:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  out=ret=malloc((strlen(buf)+1)*sizeof(lchar_t)); 
data/cups-filters-1.28.5/filter/texttotext.c:607:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    nread = read (fd, inbuf + insize, sizeof (inbuf) - insize);
data/cups-filters-1.28.5/filter/urftopdf.cpp:303:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if(read(fd, &line_repeat_byte, 1) < 1)
data/cups-filters-1.28.5/filter/urftopdf.cpp:318:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if(read(fd, &packbit_code, 1) < 1)
data/cups-filters-1.28.5/filter/urftopdf.cpp:338:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                if(read(fd, &pixel_container[0], pixel_size) < pixel_size)
data/cups-filters-1.28.5/filter/urftopdf.cpp:375:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    if(read(fd, &pixel_container[0], pixel_size) < pixel_size)
data/cups-filters-1.28.5/filter/urftopdf.cpp:439:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if(read(fd, &head_orig, sizeof(head)) == -1) die("Unable to read file header");
data/cups-filters-1.28.5/filter/urftopdf.cpp:456:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if(read(fd, &page_header_orig, sizeof(page_header_orig)) == -1) die("Unable to read page header");
data/cups-filters-1.28.5/fontembed/dynstring.c:66:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int need,len=strlen(fmt)+100;
data/cups-filters-1.28.5/fontembed/embed.c:186:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*output)(fontname,strlen(fontname),context);
data/cups-filters-1.28.5/fontembed/embed_pdf.c:43:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len=strlen(name);
data/cups-filters-1.28.5/fontembed/embed_pdf.c:102:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(subset_tag)==6);
data/cups-filters-1.28.5/fontembed/embed_pdf.c:105:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len+=strlen(fontname)+1;
data/cups-filters-1.28.5/fontembed/embed_pdf.c:110:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len+=strlen(cid_registry)+1;
data/cups-filters-1.28.5/fontembed/embed_pdf.c:111:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len+=strlen(cid_ordering)+1;
data/cups-filters-1.28.5/fontembed/embed_pdf.c:126:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len+=strlen(fontname)+1;
data/cups-filters-1.28.5/fontembed/embed_pdf.c:139:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len+=strlen(cid_registry)+1;
data/cups-filters-1.28.5/fontembed/embed_pdf.c:143:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len+=strlen(cid_registry)+1;
data/cups-filters-1.28.5/fontembed/sfnt.c:297:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(end,file,tmp-file);
data/cups-filters-1.28.5/utils/cups-browsed.c:747:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while(isspace(buf[strlen(buf)-1])) buf[strlen(buf)-1] = '\0';
data/cups-filters-1.28.5/utils/cups-browsed.c:747:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while(isspace(buf[strlen(buf)-1])) buf[strlen(buf)-1] = '\0';
data/cups-filters-1.28.5/utils/cups-browsed.c:784:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while(isspace(buf[strlen(buf)-1])) buf[strlen(buf)-1] = '\0';
data/cups-filters-1.28.5/utils/cups-browsed.c:784:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while(isspace(buf[strlen(buf)-1])) buf[strlen(buf)-1] = '\0';
data/cups-filters-1.28.5/utils/cups-browsed.c:1090:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size = strlen(s);
data/cups-filters-1.28.5/utils/cups-browsed.c:1418:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        values[i]=malloc(sizeof(char)*strlen(q)+1);
data/cups-filters-1.28.5/utils/cups-browsed.c:1419:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(values[i], q, sizeof(values[i]) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:1490:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        values[i] = malloc(sizeof(char) * strlen(q) + 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:1491:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(values[i], q, sizeof(values[i]) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:1561:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        values[i] = malloc(sizeof(char) * strlen(q) + 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:1562:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(values[i], q, sizeof(values[i]) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:1936:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strlen(media_type) > 1) {
data/cups-filters-1.28.5/utils/cups-browsed.c:1945:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if(strlen(media_source) > 1) {
data/cups-filters-1.28.5/utils/cups-browsed.c:2606:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  t_len = strlen(t);
data/cups-filters-1.28.5/utils/cups-browsed.c:2608:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    option1_len = strlen(option1);
data/cups-filters-1.28.5/utils/cups-browsed.c:2610:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    option2_len = strlen(option2);
data/cups-filters-1.28.5/utils/cups-browsed.c:3047:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(media_type) > 1) {
data/cups-filters-1.28.5/utils/cups-browsed.c:3068:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(media_source) > 1) {
data/cups-filters-1.28.5/utils/cups-browsed.c:3259:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  resource = uri + (strlen(uri) - strlen(printer) - 10);
data/cups-filters-1.28.5/utils/cups-browsed.c:3259:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  resource = uri + (strlen(uri) - strlen(printer) - 10);
data/cups-filters-1.28.5/utils/cups-browsed.c:3568:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(str) < 1)
data/cups-filters-1.28.5/utils/cups-browsed.c:3577:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i = 0, j = 0; i < strlen(str); i++, j++) {
data/cups-filters-1.28.5/utils/cups-browsed.c:3604:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(str) > 0 && str[strlen(str)-1] == sep)
data/cups-filters-1.28.5/utils/cups-browsed.c:3604:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (strlen(str) > 0 && str[strlen(str)-1] == sep)
data/cups-filters-1.28.5/utils/cups-browsed.c:3605:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      str[strlen(str)-1] = '\0';
data/cups-filters-1.28.5/utils/cups-browsed.c:3613:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return memmove(str, str + i, strlen(str) - i + 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:4266:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bval.bv_len = (BrowseLDAPPassword == NULL) ? 0 : strlen(BrowseLDAPPassword);
data/cups-filters-1.28.5/utils/cups-browsed.c:4535:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bval.bv_len = (BrowseLDAPPassword == NULL) ? 0 : strlen(BrowseLDAPPassword);
data/cups-filters-1.28.5/utils/cups-browsed.c:4761:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (local_resource, resource + 1, sizeof (local_resource) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:4770:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     (strlen(info) > 0 ? info : strchr(local_resource, '/') + 1), host);
data/cups-filters-1.28.5/utils/cups-browsed.c:4772:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hl = strlen(service_name);
data/cups-filters-1.28.5/utils/cups-browsed.c:4910:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(retval, bval[0]->bv_val, size);
data/cups-filters-1.28.5/utils/cups-browsed.c:4929:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(retval, *value, maxsize);
data/cups-filters-1.28.5/utils/cups-browsed.c:5430:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (printer == NULL || strlen(printer) == 0)
data/cups-filters-1.28.5/utils/cups-browsed.c:5464:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(p) > 0)
data/cups-filters-1.28.5/utils/cups-browsed.c:5560:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (printer == NULL || strlen(printer) == 0)
data/cups-filters-1.28.5/utils/cups-browsed.c:5605:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(buf, ppd_opt->keyword, sizeof(buf));
data/cups-filters-1.28.5/utils/cups-browsed.c:5616:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    resource = uri + (strlen(uri) - strlen(printer) - 10);
data/cups-filters-1.28.5/utils/cups-browsed.c:5616:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    resource = uri + (strlen(uri) - strlen(printer) - 10);
data/cups-filters-1.28.5/utils/cups-browsed.c:5632:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       strcasecmp(key + strlen(key) - strlen(*ptr) + 1, *ptr + 1) == 0))
data/cups-filters-1.28.5/utils/cups-browsed.c:5632:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       strcasecmp(key + strlen(key) - strlen(*ptr) + 1, *ptr + 1) == 0))
data/cups-filters-1.28.5/utils/cups-browsed.c:5637:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       strncasecmp(key + strlen(key) - 8, "-default", 8))) {
data/cups-filters-1.28.5/utils/cups-browsed.c:5643:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memmove(c, c + 1, strlen(c));
data/cups-filters-1.28.5/utils/cups-browsed.c:5694:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (printer == NULL || strlen(printer) == 0 || options == NULL)
data/cups-filters-1.28.5/utils/cups-browsed.c:5715:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(opt) > 1 && (val = strchr(opt, '=')) != NULL) {
data/cups-filters-1.28.5/utils/cups-browsed.c:5718:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	val[strlen(val)-1] = '\0';
data/cups-filters-1.28.5/utils/cups-browsed.c:5888:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((backup_queue_name = malloc((strlen(queue_name) +
data/cups-filters-1.28.5/utils/cups-browsed.c:5889:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     strlen(remote_host) + 2) *
data/cups-filters-1.28.5/utils/cups-browsed.c:5937:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((str = strrchr(resource, '/')) != NULL && strlen(str) > 1) {
data/cups-filters-1.28.5/utils/cups-browsed.c:6079:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, text, ptr - text);
data/cups-filters-1.28.5/utils/cups-browsed.c:6116:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, text, ptr - text);
data/cups-filters-1.28.5/utils/cups-browsed.c:6368:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		  strncpy(destination_uri, p->uri, sizeof(destination_uri) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:6390:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(destination_uri, p->uri,
data/cups-filters-1.28.5/utils/cups-browsed.c:6772:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   (strlen(device) < 16 ||
data/cups-filters-1.28.5/utils/cups-browsed.c:7320:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(valuebuffer, ippGetString(attr, i, NULL),
data/cups-filters-1.28.5/utils/cups-browsed.c:7322:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if (strlen(ippGetString(attr, i, NULL)) > 65535)
data/cups-filters-1.28.5/utils/cups-browsed.c:7354:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(valuebuffer, ippGetString(attr, i, NULL),
data/cups-filters-1.28.5/utils/cups-browsed.c:7356:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strlen(ippGetString(attr, i, NULL)) > 65535)
data/cups-filters-1.28.5/utils/cups-browsed.c:7387:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(valuebuffer, ippGetString(attr, i, NULL),
data/cups-filters-1.28.5/utils/cups-browsed.c:7389:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strlen(ippGetString(attr, i, NULL)) > 65535)
data/cups-filters-1.28.5/utils/cups-browsed.c:7423:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(valuebuffer, ippGetString(attr, i, NULL),
data/cups-filters-1.28.5/utils/cups-browsed.c:7425:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if (strlen(ippGetString(attr, i, NULL)) > 65535)
data/cups-filters-1.28.5/utils/cups-browsed.c:8162:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	      strncpy(make_model, ippGetString(attr, 0, NULL),
data/cups-filters-1.28.5/utils/cups-browsed.c:8404:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  bytes = write(fd, buffer, strlen(buffer));
data/cups-filters-1.28.5/utils/cups-browsed.c:8405:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if (bytes != strlen(buffer)) {
data/cups-filters-1.28.5/utils/cups-browsed.c:8504:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	      strncpy(make_model, ippGetString(attr, 0, NULL),
data/cups-filters-1.28.5/utils/cups-browsed.c:8584:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(device_uri) > HTTP_MAX_URI-1)
data/cups-filters-1.28.5/utils/cups-browsed.c:8638:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(keyword, line + 8, sizeof(keyword) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:8639:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if ((strlen(line) + 8) > 1023)
data/cups-filters-1.28.5/utils/cups-browsed.c:9169:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9198:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(list) + strlen(ifa->ifa_name) + 1 <=
data/cups-filters-1.28.5/utils/cups-browsed.c:9198:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(list) + strlen(ifa->ifa_name) + 1 <=
data/cups-filters-1.28.5/utils/cups-browsed.c:9200:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9202:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9225:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      if (addr_found == 1 && strlen(list) + 3 <=
data/cups-filters-1.28.5/utils/cups-browsed.c:9227:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9229:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9231:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      if (addr_found == 0 && strlen(list) + 3 <=
data/cups-filters-1.28.5/utils/cups-browsed.c:9233:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9235:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9238:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      if (strlen(list) + strlen(buf) + 1 <=
data/cups-filters-1.28.5/utils/cups-browsed.c:9238:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      if (strlen(list) + strlen(buf) + 1 <=
data/cups-filters-1.28.5/utils/cups-browsed.c:9240:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9242:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9318:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (addr_found == 1 && strlen(list) + 3 <= sizeof(list)) {
data/cups-filters-1.28.5/utils/cups-browsed.c:9319:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9321:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9323:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (addr_found == 0 && strlen(list) + 3 <= sizeof(list)) {
data/cups-filters-1.28.5/utils/cups-browsed.c:9324:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9326:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9329:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(list) + strlen(iface->address) + 2 <= sizeof(list)) {
data/cups-filters-1.28.5/utils/cups-browsed.c:9329:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(list) + strlen(iface->address) + 2 <= sizeof(list)) {
data/cups-filters-1.28.5/utils/cups-browsed.c:9330:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9332:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9342:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (addr_found == 1 && strlen(list) + 2 <= sizeof(list)) {
data/cups-filters-1.28.5/utils/cups-browsed.c:9343:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9345:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9347:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(list) + 3 <= sizeof(list)) {
data/cups-filters-1.28.5/utils/cups-browsed.c:9348:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	snprintf(l, sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9350:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = list + strlen(list);
data/cups-filters-1.28.5/utils/cups-browsed.c:9356:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(list) + 2 <= sizeof(list))
data/cups-filters-1.28.5/utils/cups-browsed.c:9359:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(list) + 5 <= sizeof(list))
data/cups-filters-1.28.5/utils/cups-browsed.c:9360:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      snprintf(list + strlen(list), sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9360:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      snprintf(list + strlen(list), sizeof(list) - strlen(list) - 1,
data/cups-filters-1.28.5/utils/cups-browsed.c:9381:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncasecmp(host_name, host, strlen(host)) == 0 &&
data/cups-filters-1.28.5/utils/cups-browsed.c:9382:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(strlen(host_name) == strlen(host) ||
data/cups-filters-1.28.5/utils/cups-browsed.c:9382:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(strlen(host_name) == strlen(host) ||
data/cups-filters-1.28.5/utils/cups-browsed.c:9383:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 (strlen(host_name) > strlen(host) &&
data/cups-filters-1.28.5/utils/cups-browsed.c:9383:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 (strlen(host_name) > strlen(host) &&
data/cups-filters-1.28.5/utils/cups-browsed.c:9384:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  (strcasecmp(host_name + strlen(host), ".local") == 0 ||
data/cups-filters-1.28.5/utils/cups-browsed.c:9385:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   strcasecmp(host_name + strlen(host), ".local.") == 0))))
data/cups-filters-1.28.5/utils/cups-browsed.c:9458:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (key && value && !strcasecmp(key, *f) && strlen(value) >= 3) {
data/cups-filters-1.28.5/utils/cups-browsed.c:9461:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    make_model[strlen(make_model) - 1] = '\0'; 
data/cups-filters-1.28.5/utils/cups-browsed.c:9477:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (key && value && strlen(value) > 1 &&
data/cups-filters-1.28.5/utils/cups-browsed.c:9512:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    value[strlen(value) - 1] != ')') {
data/cups-filters-1.28.5/utils/cups-browsed.c:9535:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (key && value && !strcasecmp(key, "pdl") && strlen(value) >= 3) {
data/cups-filters-1.28.5/utils/cups-browsed.c:9640:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   (strlen(p->uri) - strlen(resource) > 0 &&
data/cups-filters-1.28.5/utils/cups-browsed.c:9640:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   (strlen(p->uri) - strlen(resource) > 0 &&
data/cups-filters-1.28.5/utils/cups-browsed.c:9641:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    !strcasecmp(p->uri + strlen(p->uri) - strlen(resource),
data/cups-filters-1.28.5/utils/cups-browsed.c:9641:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    !strcasecmp(p->uri + strlen(p->uri) - strlen(resource),
data/cups-filters-1.28.5/utils/cups-browsed.c:10008:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(ifname, "Unknown", sizeof(ifname) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:10093:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (host_name && (adminurl_value = malloc(strlen(host_name) + 8)) != NULL)
data/cups-filters-1.28.5/utils/cups-browsed.c:10121:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(instance, name, sizeof(instance) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:10153:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	  strncpy(addrstr, "[v1.", sizeof(addrstr) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:10155:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  addrlen = strlen(addrstr + 4);
data/cups-filters-1.28.5/utils/cups-browsed.c:10292:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(ifname, "Unknown", sizeof(ifname) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:10327:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(ifname, "Unknown", sizeof(ifname) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:10626:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy (local_resource, resource + 1, sizeof (local_resource) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:10637:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hl = strlen(service_name);
data/cups-filters-1.28.5/utils/cups-browsed.c:10719:7:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
  if (sscanf (packet, "%x%x%1023s", &type, &state, uri) < 3) {
data/cups-filters-1.28.5/utils/cups-browsed.c:10838:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      strlen (packet), 0,
data/cups-filters-1.28.5/utils/cups-browsed.c:11273:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	filterLen = strlen(LDAP_BROWSE_FILTER);
data/cups-filters-1.28.5/utils/cups-browsed.c:11466:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(line, value, sizeof(line) - 1) &&
data/cups-filters-1.28.5/utils/cups-browsed.c:11467:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  ((strlen(value) > HTTP_MAX_BUFFER-1) ?
data/cups-filters-1.28.5/utils/cups-browsed.c:11504:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(cachedir, value, sizeof(cachedir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:11507:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(logdir, value, sizeof(logdir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:11887:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(start) <= 0)
data/cups-filters-1.28.5/utils/cups-browsed.c:11924:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if (strlen(start) > 0)
data/cups-filters-1.28.5/utils/cups-browsed.c:11958:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (DefaultOptions == NULL && strlen(value) > 0)
data/cups-filters-1.28.5/utils/cups-browsed.c:12186:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(val) == 0) {
data/cups-filters-1.28.5/utils/cups-browsed.c:12205:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(val) == 0) {
data/cups-filters-1.28.5/utils/cups-browsed.c:12318:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(cachedir, DEFAULT_CACHEDIR, sizeof(cachedir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:12320:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(logdir, DEFAULT_LOGDIR, sizeof(logdir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:12321:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(local_default_printer_file, cachedir,
data/cups-filters-1.28.5/utils/cups-browsed.c:12323:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(local_default_printer_file + strlen(cachedir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12323:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(local_default_printer_file + strlen(cachedir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12325:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  sizeof(local_default_printer_file) - strlen(cachedir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:12326:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(remote_default_printer_file, cachedir,
data/cups-filters-1.28.5/utils/cups-browsed.c:12328:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(remote_default_printer_file + strlen(cachedir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12328:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(remote_default_printer_file + strlen(cachedir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12330:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  sizeof(remote_default_printer_file) - strlen(cachedir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:12331:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(save_options_file, cachedir,
data/cups-filters-1.28.5/utils/cups-browsed.c:12333:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(save_options_file + strlen(cachedir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12333:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(save_options_file + strlen(cachedir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12335:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  sizeof(save_options_file) - strlen(cachedir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:12336:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(debug_log_file, logdir,
data/cups-filters-1.28.5/utils/cups-browsed.c:12338:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(debug_log_file + strlen(logdir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12338:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(debug_log_file + strlen(logdir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12340:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  sizeof(debug_log_file) - strlen(logdir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:12342:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(debug_log_file_bckp, logdir,
data/cups-filters-1.28.5/utils/cups-browsed.c:12344:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(debug_log_file_bckp + strlen(logdir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12344:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncpy(debug_log_file_bckp + strlen(logdir),
data/cups-filters-1.28.5/utils/cups-browsed.c:12346:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  sizeof(debug_log_file_bckp) - strlen(logdir) - 1);
data/cups-filters-1.28.5/utils/cups-browsed.c:12371:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(local_server_str, getenv("CUPS_SERVER"),
data/cups-filters-1.28.5/utils/cups-browsed.c:12387:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(local_server_str, DomainSocket,
data/cups-filters-1.28.5/utils/driverless.c:57:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for( int i = 0; i<strlen(a); i++)
data/cups-filters-1.28.5/utils/driverless.c:219:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(model, "Unknown", sizeof(model) - 1);
data/cups-filters-1.28.5/utils/driverless.c:222:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(make, txt_usb_mfg, sizeof(make) - 1);
data/cups-filters-1.28.5/utils/driverless.c:223:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(txt_usb_mfg) > 511)
data/cups-filters-1.28.5/utils/driverless.c:225:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr = device_id + strlen(device_id);
data/cups-filters-1.28.5/utils/driverless.c:230:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(model, txt_usb_mdl, sizeof(model) - 1);
data/cups-filters-1.28.5/utils/driverless.c:231:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(txt_usb_mdl) > 255)
data/cups-filters-1.28.5/utils/driverless.c:233:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr = device_id + strlen(device_id);
data/cups-filters-1.28.5/utils/driverless.c:239:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((ptr = txt_product + strlen(txt_product) - 1) > txt_product &&
data/cups-filters-1.28.5/utils/driverless.c:242:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(model, txt_product + 1, sizeof(model) - 1);
data/cups-filters-1.28.5/utils/driverless.c:243:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ((strlen(txt_product) + 1) > 255)
data/cups-filters-1.28.5/utils/driverless.c:246:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(model, txt_product, sizeof(model) - 1);
data/cups-filters-1.28.5/utils/driverless.c:248:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(model, txt_ty, sizeof(model) - 1);
data/cups-filters-1.28.5/utils/driverless.c:249:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(txt_ty) > 255)
data/cups-filters-1.28.5/utils/driverless.c:255:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(pdl, txt_pdl, sizeof(pdl) - 1);
data/cups-filters-1.28.5/utils/driverless.c:256:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(txt_pdl) > 255)
data/cups-filters-1.28.5/utils/driverless.c:302:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  char *valptr = value + strlen(value);
data/cups-filters-1.28.5/utils/driverless.c:314:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr = device_id + strlen(device_id);
data/cups-filters-1.28.5/utils/driverless.c:320:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  (strncasecmp(model, make, strlen(make)) ||
data/cups-filters-1.28.5/utils/driverless.c:321:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   !isspace(model[strlen(make)])))
data/cups-filters-1.28.5/utils/driverless.c:325:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(make_and_model, model, sizeof(make_and_model) - 1);
data/cups-filters-1.28.5/utils/driverless.c:672:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(ppdgenerator_msg) > 0)
data/cups-filters-1.28.5/utils/driverless.c:690:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((bytes = read(fd, buffer, sizeof(buffer))) > 0)
data/cups-filters-1.28.5/utils/driverless.c:781:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(val) == 0) {

ANALYSIS SUMMARY:

Hits = 1486
Lines analyzed = 84129 in approximately 2.36 seconds (35666 lines/second)
Physical Source Lines of Code (SLOC) = 61178
Hits@level = [0] 1562 [1] 465 [2] 777 [3]  92 [4] 146 [5]   6
Hits@level+ = [0+] 3048 [1+] 1486 [2+] 1021 [3+] 244 [4+] 152 [5+]   6
Hits/KSLOC@level+ = [0+] 49.8218 [1+] 24.2898 [2+] 16.689 [3+] 3.98836 [4+] 2.48455 [5+] 0.0980745
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.