Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/frama-c-20200625+scandium/src/libraries/utils/c_bindings.c Examining data/frama-c-20200625+scandium/src/plugins/report/tests/report/csv.c Examining data/frama-c-20200625+scandium/src/plugins/report/tests/report/classify.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_usage/global.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/unit_local.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/bug_9.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/array_initialized.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/unit_bitwise.h Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/unit_bitwise.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/injector.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/string_c.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/stmt.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/combined.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/bit_test.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/repeat.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/inductive.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/flash.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/nowp.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/subset_fopen.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_acsl/invalid_pointer.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_acsl/unit_bit_test.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_acsl/null.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_acsl/classify_float.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp/wp_call_pre.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp/sharing.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp/wp_strategy.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp/wp_behav.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.old.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo1_solved.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.old.v2.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/binary-multiplication-without-overflow.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/binary-multiplication.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo2_solved.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/loop-statement.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_hashtbl_solved.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.simplified.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_manual/working_dir/swap2.h Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_manual/working_dir/swap.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_manual/working_dir/swap1.h Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/issue_837.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/issue-516.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/bts_1647.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/bts_1601.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/issue-684-exit.c Examining data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_bts/issue_508.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_gmp_api.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_temporal.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_printf.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_mmodel.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_shadow_layout.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_assert.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_temporal_timestamp.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_leak.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_safe_locations.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_shexec.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_malloc.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_floating_point.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_debug.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_rtl.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree_api.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree_mmodel.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_alias.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_trace.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_bits.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/issue-eacsl-105.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2192.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2191.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1390.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/issue69.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2386.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/issue-eacsl-91.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1478.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2406.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1398.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1399.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1399.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2406.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2192.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2305.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1717.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1386_complex_flowgraph.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2386.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1837.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_issue69.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_issue-eacsl-105.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2191.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1326.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1718.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_issue-eacsl-91.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1700.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2231.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1478.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2252.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1324.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1398.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1740.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1307.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1304.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1395.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1390.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2252.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2305.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1386_complex_flowgraph.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/gmp-only/functions.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/gmp-only/oracle_ci/gen_functions.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/gmp-only/oracle_ci/gen_arith.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_true.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_result.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_ghost.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_lazy.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_invariant.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_labeled_stmt.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_loop.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_nested_code_annot.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_typedef.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_function_contract.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_false.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/constructs/oracle_ci/gen_stmt_contract.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/full-mmodel/oracle_ci/gen_addrOf2.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/full-mmodel/oracle_ci/gen_addrOf.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/signalled.h Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf2.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_fprintf.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/memsize.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/ctype_macros.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/valid_in_contract.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/base_addr.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/ranges_in_builtins.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/block_valid.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/mainargs.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/constructor.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/local_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/bypassed_var.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/stdout.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/ptr_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/vector.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/freeable.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/local_goto.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/valid.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/call.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/valid_alias.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/compound_initializers.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/block_length.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/decl_in_switch.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/initialized.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/local_var.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/vla.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_vector.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_valid_alias.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ghost_parameters.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_init_function.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_freeable.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ptr.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_initialized.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_alias.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_var.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ptr_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_hidden_malloc.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_block_valid.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ctype_macros.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_other_constants.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_call.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_block_length.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_compound_initializers.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_valid.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_constructor.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_base_addr.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_offset.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_mainargs.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_memalign.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_addrOf.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_stdout.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_ranges_in_builtins.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_early_exit.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_literal_string.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_vla.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_goto.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_valid_in_contract.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_null.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_goto.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_memsize.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_errno.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_bypassed_var.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_decl_in_switch.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_sizeof.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/errno.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/goto.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/offset.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/hidden_malloc.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/early_exit.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/init_function.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/memalign.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_addr-by-val.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_dpointer.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_while.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_scope.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_char.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_darray.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fptr.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_memcpy.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fun_lib.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_labels.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_malloc-asan.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_getenv.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_struct.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_array.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_lit_string.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_while.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_addr-by-val.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_char.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fptr.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_global_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_malloc.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_scope.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_malloc-asan.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_dpointer.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_darray.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_labels.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_array.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_lib.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_struct.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_args.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_ptr.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_getenv.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_memcpy.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fun_ptr.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_args.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_lit_string.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_malloc.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_global_init.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/e-acsl-valid.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/e-acsl-functions.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/e-acsl-instrument.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/oracle_ci/gen_e-acsl-valid.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/oracle_ci/gen_builtin.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/oracle_ci/gen_e-acsl-instrument.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/special/oracle_ci/gen_e-acsl-functions.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/functions_rec.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/rationals.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/at_on-purely-logic-variables.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/let.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/functions.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_rationals.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_functions_rec.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_integer_constant.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_longlong.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_not.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_at.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_quantif.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_let.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_array.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_comparison.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_functions.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_cast.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_arith.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/arith/oracle_ci/gen_at_on-purely-logic-variables.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/examples/oracle_ci/gen_linear_search.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/examples/oracle_ci/gen_functions_contiki.c Examining data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/examples/functions_contiki.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch2.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_recursion1.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_recursion2.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch3_et_recursion.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_struct.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle2.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/assigns.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch3_if.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/call_tree.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_recursion5.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle3.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_recursion4.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/other.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle_rechercheTableau.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_acces_params.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_factorial.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch3.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_boucle1.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_factorial2.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_acces_params2.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/goto.c Examining data/frama-c-20200625+scandium/src/plugins/aorai/tests/aorai/test_switch3_return.c Examining data/frama-c-20200625+scandium/share/machdep.c Examining data/frama-c-20200625+scandium/share/libc/limits.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_dev_t.h Examining data/frama-c-20200625+scandium/share/libc/getopt.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_blkcnt_t.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_pid_t.h Examining data/frama-c-20200625+scandium/share/libc/poll.h Examining data/frama-c-20200625+scandium/share/libc/__fc_integer.h Examining data/frama-c-20200625+scandium/share/libc/float.h Examining data/frama-c-20200625+scandium/share/libc/tgmath.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_seek_macros.h Examining data/frama-c-20200625+scandium/share/libc/math.h Examining data/frama-c-20200625+scandium/share/libc/string.c Examining data/frama-c-20200625+scandium/share/libc/__fc_define_blksize_t.h Examining data/frama-c-20200625+scandium/share/libc/unistd.h Examining data/frama-c-20200625+scandium/share/libc/grp.h Examining data/frama-c-20200625+scandium/share/libc/sys/utsname.h Examining data/frama-c-20200625+scandium/share/libc/sys/signal.h Examining data/frama-c-20200625+scandium/share/libc/sys/un.h Examining data/frama-c-20200625+scandium/share/libc/sys/stat.h Examining data/frama-c-20200625+scandium/share/libc/sys/mman.h Examining data/frama-c-20200625+scandium/share/libc/sys/shm.h Examining data/frama-c-20200625+scandium/share/libc/sys/ioctl.h Examining data/frama-c-20200625+scandium/share/libc/sys/times.h Examining data/frama-c-20200625+scandium/share/libc/sys/file.h Examining data/frama-c-20200625+scandium/share/libc/sys/random.h Examining data/frama-c-20200625+scandium/share/libc/sys/socket.h Examining data/frama-c-20200625+scandium/share/libc/sys/wait.h Examining data/frama-c-20200625+scandium/share/libc/sys/uio.h Examining data/frama-c-20200625+scandium/share/libc/sys/timex.h Examining data/frama-c-20200625+scandium/share/libc/sys/types.h Examining data/frama-c-20200625+scandium/share/libc/sys/time.h Examining data/frama-c-20200625+scandium/share/libc/sys/ipc.h Examining data/frama-c-20200625+scandium/share/libc/sys/select.h Examining data/frama-c-20200625+scandium/share/libc/sys/resource.h Examining data/frama-c-20200625+scandium/share/libc/inttypes.c Examining data/frama-c-20200625+scandium/share/libc/getopt.c Examining data/frama-c-20200625+scandium/share/libc/iso646.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_time_t.h Examining data/frama-c-20200625+scandium/share/libc/__fc_select.h Examining data/frama-c-20200625+scandium/share/libc/signal.h Examining data/frama-c-20200625+scandium/share/libc/termios.h Examining data/frama-c-20200625+scandium/share/libc/byteswap.h Examining data/frama-c-20200625+scandium/share/libc/wchar.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_timespec.h Examining data/frama-c-20200625+scandium/share/libc/ctype.h Examining data/frama-c-20200625+scandium/share/libc/stdarg.h Examining data/frama-c-20200625+scandium/share/libc/locale.h Examining data/frama-c-20200625+scandium/share/libc/stdio.c Examining data/frama-c-20200625+scandium/share/libc/endian.h Examining data/frama-c-20200625+scandium/share/libc/assert.c Examining data/frama-c-20200625+scandium/share/libc/utmpx.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_nlink_t.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_ssize_t.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_off_t.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_wchar_t.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_useconds_t.h Examining data/frama-c-20200625+scandium/share/libc/sched.h Examining data/frama-c-20200625+scandium/share/libc/features.h Examining data/frama-c-20200625+scandium/share/libc/resolv.h Examining data/frama-c-20200625+scandium/share/libc/stddef.h Examining data/frama-c-20200625+scandium/share/libc/strings.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_null.h Examining data/frama-c-20200625+scandium/share/libc/pwd.h Examining data/frama-c-20200625+scandium/share/libc/wctype.h Examining data/frama-c-20200625+scandium/share/libc/time.c Examining data/frama-c-20200625+scandium/share/libc/math.c Examining data/frama-c-20200625+scandium/share/libc/__fc_define_size_t.h Examining data/frama-c-20200625+scandium/share/libc/net/if.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_intptr_t.h Examining data/frama-c-20200625+scandium/share/libc/signal.c Examining data/frama-c-20200625+scandium/share/libc/locale.c Examining data/frama-c-20200625+scandium/share/libc/stropts.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_timer_t.h Examining data/frama-c-20200625+scandium/share/libc/netinet/in.h Examining data/frama-c-20200625+scandium/share/libc/netinet/tcp.h Examining data/frama-c-20200625+scandium/share/libc/__fc_alloc_axiomatic.h Examining data/frama-c-20200625+scandium/share/libc/libgen.h Examining data/frama-c-20200625+scandium/share/libc/malloc.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_pthread_types.h Examining data/frama-c-20200625+scandium/share/libc/__fc_builtin.c Examining data/frama-c-20200625+scandium/share/libc/setjmp.h Examining data/frama-c-20200625+scandium/share/libc/fnmatch.h Examining data/frama-c-20200625+scandium/share/libc/utime.h Examining data/frama-c-20200625+scandium/share/libc/__fc_inet.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_iovec.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_fpos_t.h Examining data/frama-c-20200625+scandium/share/libc/pthread.h Examining data/frama-c-20200625+scandium/share/libc/inttypes.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_stat.h Examining data/frama-c-20200625+scandium/share/libc/fenv.c Examining data/frama-c-20200625+scandium/share/libc/__fc_runtime.c Examining data/frama-c-20200625+scandium/share/libc/__fc_define_eof.h Examining data/frama-c-20200625+scandium/share/libc/errno.h Examining data/frama-c-20200625+scandium/share/libc/ifaddrs.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_key_t.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_mode_t.h Examining data/frama-c-20200625+scandium/share/libc/stdio.h Examining data/frama-c-20200625+scandium/share/libc/fenv.h Examining data/frama-c-20200625+scandium/share/libc/memory.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_sockaddr.h Examining data/frama-c-20200625+scandium/share/libc/netdb.c Examining data/frama-c-20200625+scandium/share/libc/__fc_define_fd_set_t.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_uid_and_gid.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_wint_t.h Examining data/frama-c-20200625+scandium/share/libc/stdbool.h Examining data/frama-c-20200625+scandium/share/libc/iconv.h Examining data/frama-c-20200625+scandium/share/libc/__fc_gcc_builtins.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_file.h Examining data/frama-c-20200625+scandium/share/libc/time.h Examining data/frama-c-20200625+scandium/share/libc/__fc_string_axiomatic.h Examining data/frama-c-20200625+scandium/share/libc/stdlib.h Examining data/frama-c-20200625+scandium/share/libc/complex.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_sigset_t.h Examining data/frama-c-20200625+scandium/share/libc/ftw.h Examining data/frama-c-20200625+scandium/share/libc/alloca.h Examining data/frama-c-20200625+scandium/share/libc/stdint.h Examining data/frama-c-20200625+scandium/share/libc/netdb.h Examining data/frama-c-20200625+scandium/share/libc/__fc_builtin.h Examining data/frama-c-20200625+scandium/share/libc/errno.c Examining data/frama-c-20200625+scandium/share/libc/arpa/inet.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_ino_t.h Examining data/frama-c-20200625+scandium/share/libc/syslog.h Examining data/frama-c-20200625+scandium/share/libc/dirent.h Examining data/frama-c-20200625+scandium/share/libc/glob.h Examining data/frama-c-20200625+scandium/share/libc/nl_types.h Examining data/frama-c-20200625+scandium/share/libc/__fc_machdep_linux_shared.h Examining data/frama-c-20200625+scandium/share/libc/__fc_machdep.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_clockid_t.h Examining data/frama-c-20200625+scandium/share/libc/semaphore.h Examining data/frama-c-20200625+scandium/share/libc/unistd.c Examining data/frama-c-20200625+scandium/share/libc/__fc_define_suseconds_t.h Examining data/frama-c-20200625+scandium/share/libc/regex.h Examining data/frama-c-20200625+scandium/share/libc/assert.h Examining data/frama-c-20200625+scandium/share/libc/stdlib.c Examining data/frama-c-20200625+scandium/share/libc/string.h Examining data/frama-c-20200625+scandium/share/libc/dlfcn.h Examining data/frama-c-20200625+scandium/share/libc/wchar.c Examining data/frama-c-20200625+scandium/share/libc/__fc_define_sa_family_t.h Examining data/frama-c-20200625+scandium/share/libc/glob.c Examining data/frama-c-20200625+scandium/share/libc/ctype.c Examining data/frama-c-20200625+scandium/share/libc/fcntl.h Examining data/frama-c-20200625+scandium/share/libc/__fc_define_id_t.h Examining data/frama-c-20200625+scandium/share/analysis-scripts/examples/example.c Examining data/frama-c-20200625+scandium/share/analysis-scripts/fc_stubs.c Examining data/frama-c-20200625+scandium/share/libc.c Examining data/frama-c-20200625+scandium/tests/misc/cpp-extra-args-per-file1.c Examining data/frama-c-20200625+scandium/tests/misc/pragma_pack_zero.c Examining data/frama-c-20200625+scandium/tests/misc/custom_machdep/__fc_machdep_custom.h Examining data/frama-c-20200625+scandium/tests/misc/issue_191.c Examining data/frama-c-20200625+scandium/tests/misc/wstring_phase6.c Examining data/frama-c-20200625+scandium/tests/misc/long_ident.c Examining data/frama-c-20200625+scandium/tests/misc/pragma-pack.c Examining data/frama-c-20200625+scandium/tests/misc/widen_hints2.c Examining data/frama-c-20200625+scandium/tests/misc/char_ampamp.c Examining data/frama-c-20200625+scandium/tests/misc/my_visitor.c Examining data/frama-c-20200625+scandium/tests/misc/bug_0209.c Examining data/frama-c-20200625+scandium/tests/misc/bts0541.c Examining data/frama-c-20200625+scandium/tests/misc/widen_hints.c Examining data/frama-c-20200625+scandium/tests/misc/custom_machdep.c Examining data/frama-c-20200625+scandium/tests/misc/pragma-pack-utils.h Examining data/frama-c-20200625+scandium/tests/misc/find_enclosing_loop.c Examining data/frama-c-20200625+scandium/tests/misc/obfuscate.c Examining data/frama-c-20200625+scandium/tests/misc/widen_hints_float.c Examining data/frama-c-20200625+scandium/tests/misc/cpp-extra-args-per-file2.c Examining data/frama-c-20200625+scandium/tests/spec/acsl_by_example.c Examining data/frama-c-20200625+scandium/tests/spec/lib.h Examining data/frama-c-20200625+scandium/tests/spec/array_typedef.c Examining data/frama-c-20200625+scandium/tests/spec/transitive_rel.c Examining data/frama-c-20200625+scandium/tests/spec/printf_assigns.c Examining data/frama-c-20200625+scandium/tests/spec/for_scope.c Examining data/frama-c-20200625+scandium/tests/spec/unused.c Examining data/frama-c-20200625+scandium/tests/spec/merge_bts938.h Examining data/frama-c-20200625+scandium/tests/spec/acsl_basic_allocator.c Examining data/frama-c-20200625+scandium/tests/spec/parsing.c Examining data/frama-c-20200625+scandium/tests/spec/prototype_assigns.c Examining data/frama-c-20200625+scandium/tests/spec/use2.c Examining data/frama-c-20200625+scandium/tests/spec/volatile_aux.c Examining data/frama-c-20200625+scandium/tests/spec/polymorph.c Examining data/frama-c-20200625+scandium/tests/spec/multiple_spec.c Examining data/frama-c-20200625+scandium/tests/spec/purse.c Examining data/frama-c-20200625+scandium/tests/spec/liens.c Examining data/frama-c-20200625+scandium/tests/spec/sizeof.c Examining data/frama-c-20200625+scandium/tests/spec/string.c Examining data/frama-c-20200625+scandium/tests/spec/axiom_included.c Examining data/frama-c-20200625+scandium/tests/spec/if.c Examining data/frama-c-20200625+scandium/tests/spec/multiple_decl_def_2.c Examining data/frama-c-20200625+scandium/tests/spec/behavior_assert.c Examining data/frama-c-20200625+scandium/tests/spec/conversion.c Examining data/frama-c-20200625+scandium/tests/spec/model2.c Examining data/frama-c-20200625+scandium/tests/spec/third.c Examining data/frama-c-20200625+scandium/tests/spec/array_conversion.c Examining data/frama-c-20200625+scandium/tests/spec/footprint.c Examining data/frama-c-20200625+scandium/tests/spec/predicates.c Examining data/frama-c-20200625+scandium/tests/spec/merge_logic_globals_1.c Examining data/frama-c-20200625+scandium/tests/spec/pointer_comparable.c Examining data/frama-c-20200625+scandium/tests/spec/regions2.c Examining data/frama-c-20200625+scandium/tests/spec/annot_main.c Examining data/frama-c-20200625+scandium/tests/spec/bool.c Examining data/frama-c-20200625+scandium/tests/spec/bts0283.c Examining data/frama-c-20200625+scandium/tests/spec/location_char.c Examining data/frama-c-20200625+scandium/tests/spec/at_exit.c Examining data/frama-c-20200625+scandium/tests/spec/volatile.h Examining data/frama-c-20200625+scandium/tests/spec/multiple_decl_def_1.c Examining data/frama-c-20200625+scandium/tests/spec/clash_double_file_bts1598.c Examining data/frama-c-20200625+scandium/tests/spec/complete_behaviors.c Examining data/frama-c-20200625+scandium/tests/spec/doxygen.c Examining data/frama-c-20200625+scandium/tests/spec/terminates.c Examining data/frama-c-20200625+scandium/tests/spec/conf1.h Examining data/frama-c-20200625+scandium/tests/spec/assigns.c Examining data/frama-c-20200625+scandium/tests/spec/logic_compare.c Examining data/frama-c-20200625+scandium/tests/spec/bts1262.c Examining data/frama-c-20200625+scandium/tests/spec/pointer_cast.c Examining data/frama-c-20200625+scandium/tests/spec/assigns_void.c Examining data/frama-c-20200625+scandium/tests/spec/assigns_array.c Examining data/frama-c-20200625+scandium/tests/spec/merge_logic_globals_2.c Examining data/frama-c-20200625+scandium/tests/spec/multiple_file_1.c Examining data/frama-c-20200625+scandium/tests/spec/prec_i.h Examining data/frama-c-20200625+scandium/tests/spec/const.c Examining data/frama-c-20200625+scandium/tests/spec/all.c Examining data/frama-c-20200625+scandium/tests/spec/bts0812.c Examining data/frama-c-20200625+scandium/tests/spec/at.c Examining data/frama-c-20200625+scandium/tests/spec/preprocess.h Examining data/frama-c-20200625+scandium/tests/spec/statement_behavior.c Examining data/frama-c-20200625+scandium/tests/spec/multiple_include_2.c Examining data/frama-c-20200625+scandium/tests/spec/merge_bts938.c Examining data/frama-c-20200625+scandium/tests/spec/model1.c Examining data/frama-c-20200625+scandium/tests/spec/onelineghost.c Examining data/frama-c-20200625+scandium/tests/spec/tableau_zones.c Examining data/frama-c-20200625+scandium/tests/spec/max.c Examining data/frama-c-20200625+scandium/tests/spec/ghost.c Examining data/frama-c-20200625+scandium/tests/spec/concrete_type.c Examining data/frama-c-20200625+scandium/tests/spec/bug96.c Examining data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c Examining data/frama-c-20200625+scandium/tests/spec/model1.h Examining data/frama-c-20200625+scandium/tests/spec/updater.c Examining data/frama-c-20200625+scandium/tests/spec/first.c Examining data/frama-c-20200625+scandium/tests/spec/multiple_file_2.c Examining data/frama-c-20200625+scandium/tests/spec/lib.c Examining data/frama-c-20200625+scandium/tests/spec/volatile.c Examining data/frama-c-20200625+scandium/tests/spec/regions.c Examining data/frama-c-20200625+scandium/tests/spec/use.c Examining data/frama-c-20200625+scandium/tests/spec/declspec.c Examining data/frama-c-20200625+scandium/tests/spec/preprocess.c Examining data/frama-c-20200625+scandium/tests/spec/global_invariant.c Examining data/frama-c-20200625+scandium/tests/spec/dec.h Examining data/frama-c-20200625+scandium/tests/spec/source_annot.c Examining data/frama-c-20200625+scandium/tests/spec/ucn.c Examining data/frama-c-20200625+scandium/tests/spec/boolean_ops.c Examining data/frama-c-20200625+scandium/tests/spec/second.c Examining data/frama-c-20200625+scandium/tests/spec/kw.c Examining data/frama-c-20200625+scandium/tests/spec/exit_clause.c Examining data/frama-c-20200625+scandium/tests/spec/multiple_include_1.c Examining data/frama-c-20200625+scandium/tests/spec/ptr_cast.c Examining data/frama-c-20200625+scandium/tests/spec/hosum.c Examining data/frama-c-20200625+scandium/tests/spec/permut.c Examining data/frama-c-20200625+scandium/tests/spec/homax.c Examining data/frama-c-20200625+scandium/tests/spec/spec_zero_arg.c Examining data/frama-c-20200625+scandium/tests/spec/pi.c Examining data/frama-c-20200625+scandium/tests/spec/assign_in_spec.c Examining data/frama-c-20200625+scandium/tests/spec/builtins.c Examining data/frama-c-20200625+scandium/tests/spec/axiom_included.h Examining data/frama-c-20200625+scandium/tests/spec/bsearch.c Examining data/frama-c-20200625+scandium/tests/spec/localization.c Examining data/frama-c-20200625+scandium/tests/spec/multi_behavior.c Examining data/frama-c-20200625+scandium/tests/spec/enum.c Examining data/frama-c-20200625+scandium/tests/spec/multidecl.c Examining data/frama-c-20200625+scandium/tests/spec/tsets.c Examining data/frama-c-20200625+scandium/tests/spec/logic_def.c Examining data/frama-c-20200625+scandium/tests/spec/array_prm.c Examining data/frama-c-20200625+scandium/tests/spec/logic_type.c Examining data/frama-c-20200625+scandium/tests/spec/behaviors_decl_def.c Examining data/frama-c-20200625+scandium/tests/spec/acsl_allocator.c Examining data/frama-c-20200625+scandium/tests/spec/multidim.c Examining data/frama-c-20200625+scandium/tests/spec/axiom_included_1.c Examining data/frama-c-20200625+scandium/tests/spec/separated.c Examining data/frama-c-20200625+scandium/tests/spec/nested.c Examining data/frama-c-20200625+scandium/tests/spec/shifts.c Examining data/frama-c-20200625+scandium/tests/spec/behavior_names.c Examining data/frama-c-20200625+scandium/tests/spec/preprocess_string.c Examining data/frama-c-20200625+scandium/tests/spec/fct_ptr.c Examining data/frama-c-20200625+scandium/tests/spec/range.c Examining data/frama-c-20200625+scandium/tests/spec/logic_label.c Examining data/frama-c-20200625+scandium/tests/spec/multiple_include.h Examining data/frama-c-20200625+scandium/tests/spec/typedef.c Examining data/frama-c-20200625+scandium/tests/spec/unification.c Examining data/frama-c-20200625+scandium/tests/spec/merge_bts938_1.c Examining data/frama-c-20200625+scandium/tests/spec/logic_labels_wrong.c Examining data/frama-c-20200625+scandium/tests/spec/null_ptr.c Examining data/frama-c-20200625+scandium/tests/spec/char_cst.c Examining data/frama-c-20200625+scandium/tests/spec/merge_logic_globals.h Examining data/frama-c-20200625+scandium/tests/spec/local.c Examining data/frama-c-20200625+scandium/tests/spec/struct_invariant.c Examining data/frama-c-20200625+scandium/tests/spec/assume.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/glob2_int_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/noAnyMeta_int_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/anyMeta_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/glob2_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/loop_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/glob2_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/noAnyMeta_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/anyMeta_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/anyMeta_int_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/glob2_int_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/loop_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/noAnyMeta_int_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/anyMeta_int_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob2/noAnyMeta_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/loop_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/loop_int_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/loop_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/loop_int_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob1/bounds_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob1/bounds_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/constants.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/fetchsms2.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/constants.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/constants.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gd.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_no_entities_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_some_entities_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_some_entities_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_simp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_no_entities_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_simp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/constants.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/structs.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/constants.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/apache.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixShort_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixLong_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixShort_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixLong_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/apache.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/apache.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/constants.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/main/simp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/main/simp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/simp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/simp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/vars_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/vars_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/two_expands_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/expands_vars_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/simp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/expands_vars_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/simp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/two_expands_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/bind.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/bind.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/bind.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/constants.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/giwscan_cb/giwscan_cb_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/giwscan_cb/giwscan_cb_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/wu-ftpd.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/wu-ftpd.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/wu-ftpd.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/wu-ftpd.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_arr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_ptr_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_ptr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_arr_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/complete/util-bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/txt-dns.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_no_cast_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_no_cast_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/tTflag-ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/sendmail.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/tTflag-bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/my-main.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_one_loop_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_one_loop_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_heavy_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_no_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_med_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_no_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_no_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_heavy_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_no_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_med_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_heavy_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_no_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_no_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_heavy_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_med_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_med_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_no_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_med_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_heavy_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_no_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_med_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_heavy_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_no_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_med_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_heavy_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_no_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_med_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_no_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_heavy_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_heavy_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_med_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_no_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_med_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_heavy_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_med_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_heavy_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_heavy_test_ok.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_med_test_bad.c Examining data/frama-c-20200625+scandium/tests/verisec/suite/lib/base.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h Examining data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c Examining data/frama-c-20200625+scandium/tests/saveload/isset.c Examining data/frama-c-20200625+scandium/tests/saveload/bool.c Examining data/frama-c-20200625+scandium/tests/cil/change_formals.c Examining data/frama-c-20200625+scandium/tests/cil/cpu_b.c Examining data/frama-c-20200625+scandium/tests/cil/empty_cond.c Examining data/frama-c-20200625+scandium/tests/cil/cpu_a.c Examining data/frama-c-20200625+scandium/tests/cil/overlap.c Examining data/frama-c-20200625+scandium/tests/cil/annot.c Examining data/frama-c-20200625+scandium/tests/cil/comments.c Examining data/frama-c-20200625+scandium/tests/cil/merge.c Examining data/frama-c-20200625+scandium/tests/cil/ghost_cfg.c Examining data/frama-c-20200625+scandium/tests/cil/merge2.c Examining data/frama-c-20200625+scandium/tests/cil/digraphs_c99.c Examining data/frama-c-20200625+scandium/tests/cil/branch.c Examining data/frama-c-20200625+scandium/tests/cil/bts297.c Examining data/frama-c-20200625+scandium/tests/cil/bts342.c Examining data/frama-c-20200625+scandium/tests/cil/issues.c Examining data/frama-c-20200625+scandium/tests/cil/duplicate-labels.c Examining data/frama-c-20200625+scandium/tests/syntax/cert-dcl-36.c Examining data/frama-c-20200625+scandium/tests/syntax/typedef_multi.h Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align4.c Examining data/frama-c-20200625+scandium/tests/syntax/multiline_macro.c Examining data/frama-c-20200625+scandium/tests/syntax/ghost_parameters.c Examining data/frama-c-20200625+scandium/tests/syntax/bts0323-2.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align1.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_inline_2.c Examining data/frama-c-20200625+scandium/tests/syntax/inconsistent_global_ghost_spec.c Examining data/frama-c-20200625+scandium/tests/syntax/bts0323.h Examining data/frama-c-20200625+scandium/tests/syntax/enum1.c Examining data/frama-c-20200625+scandium/tests/syntax/assert_location.c Examining data/frama-c-20200625+scandium/tests/syntax/multiple_decls_contracts.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align3.c Examining data/frama-c-20200625+scandium/tests/syntax/ghost_cv_var_decl.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align2.c Examining data/frama-c-20200625+scandium/tests/syntax/ghost_cv_parsing_errors.c Examining data/frama-c-20200625+scandium/tests/syntax/exit.c Examining data/frama-c-20200625+scandium/tests/syntax/undeclared_local_bts1126.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_inline_1.c Examining data/frama-c-20200625+scandium/tests/syntax/loop-case-switch-for-unroll.c Examining data/frama-c-20200625+scandium/tests/syntax/offsetof.c Examining data/frama-c-20200625+scandium/tests/syntax/line_number.c Examining data/frama-c-20200625+scandium/tests/syntax/sizeof_incomplete_type.c Examining data/frama-c-20200625+scandium/tests/syntax/fc_filename.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_union.h Examining data/frama-c-20200625+scandium/tests/syntax/gcc_builtins.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_attrs_align.c Examining data/frama-c-20200625+scandium/tests/syntax/undeclared_local_bts1113.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_unused.h Examining data/frama-c-20200625+scandium/tests/syntax/merge_unused.c Examining data/frama-c-20200625+scandium/tests/syntax/inserted_casts.c Examining data/frama-c-20200625+scandium/tests/syntax/enum2.c Examining data/frama-c-20200625+scandium/tests/syntax/assembly_gmp.c Examining data/frama-c-20200625+scandium/tests/syntax/signal.c Examining data/frama-c-20200625+scandium/tests/syntax/bts0519.c Examining data/frama-c-20200625+scandium/tests/syntax/vla_strlen.c Examining data/frama-c-20200625+scandium/tests/syntax/bts0672_link_2.c Examining data/frama-c-20200625+scandium/tests/syntax/attributes-declarations-definitions.c Examining data/frama-c-20200625+scandium/tests/syntax/cert_exp10.c Examining data/frama-c-20200625+scandium/tests/syntax/ghost_else_bad.c Examining data/frama-c-20200625+scandium/tests/syntax/ghost_multiline_annot.c Examining data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_union_2.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_union_3.c Examining data/frama-c-20200625+scandium/tests/syntax/inconsistent_decl.c Examining data/frama-c-20200625+scandium/tests/syntax/const-assignments.c Examining data/frama-c-20200625+scandium/tests/syntax/cert_msc_38.c Examining data/frama-c-20200625+scandium/tests/syntax/bts0672_link.c Examining data/frama-c-20200625+scandium/tests/syntax/anon_enum_libc.c Examining data/frama-c-20200625+scandium/tests/syntax/static_formals_2.c Examining data/frama-c-20200625+scandium/tests/syntax/typedef_multi_1.c Examining data/frama-c-20200625+scandium/tests/syntax/copy_visitor_bts_1073.c Examining data/frama-c-20200625+scandium/tests/syntax/incompatible_qualifiers.c Examining data/frama-c-20200625+scandium/tests/syntax/reject_use_decl_mismatch_bts728.c Examining data/frama-c-20200625+scandium/tests/syntax/libc_defs.c Examining data/frama-c-20200625+scandium/tests/syntax/static_formals_1.c Examining data/frama-c-20200625+scandium/tests/syntax/macro_escape_chars.c Examining data/frama-c-20200625+scandium/tests/syntax/assert_location.h Examining data/frama-c-20200625+scandium/tests/syntax/typedef_namespace_bts1500.c Examining data/frama-c-20200625+scandium/tests/syntax/bts0323.c Examining data/frama-c-20200625+scandium/tests/syntax/static_formals.h Examining data/frama-c-20200625+scandium/tests/syntax/anon_enum_libc.h Examining data/frama-c-20200625+scandium/tests/syntax/compile_constant.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_union.c Examining data/frama-c-20200625+scandium/tests/syntax/literal-question-no-trigraph.c Examining data/frama-c-20200625+scandium/tests/syntax/offset.c Examining data/frama-c-20200625+scandium/tests/syntax/va.c Examining data/frama-c-20200625+scandium/tests/syntax/foo".c Examining data/frama-c-20200625+scandium/tests/syntax/no-print-libc-reparse.c Examining data/frama-c-20200625+scandium/tests/syntax/cpp-command.c Examining data/frama-c-20200625+scandium/tests/syntax/merge_unused_2.c Examining data/frama-c-20200625+scandium/tests/syntax/typedef_multi_2.c Examining data/frama-c-20200625+scandium/tests/syntax/enum.h Examining data/frama-c-20200625+scandium/tests/syntax/define_string_logic_pp_bts2101.c Examining data/frama-c-20200625+scandium/tests/syntax/dowhilezero.c Examining data/frama-c-20200625+scandium/tests/syntax/temporary_location.c Examining data/frama-c-20200625+scandium/tests/syntax/type_compat_call.c Examining data/frama-c-20200625+scandium/tests/slicing/bts709.c Examining data/frama-c-20200625+scandium/tests/slicing/unitialized.c Examining data/frama-c-20200625+scandium/tests/slicing/adpcm.c Examining data/frama-c-20200625+scandium/tests/slicing/variadic.c Examining data/frama-c-20200625+scandium/tests/bugs/check_specs.h Examining data/frama-c-20200625+scandium/tests/bugs/enum.c Examining data/frama-c-20200625+scandium/tests/libc/termios.c Examining data/frama-c-20200625+scandium/tests/libc/netdb_c.c Examining data/frama-c-20200625+scandium/tests/libc/string_c.c Examining data/frama-c-20200625+scandium/tests/libc/fpclassify.c Examining data/frama-c-20200625+scandium/tests/libc/sys_wait_h.c Examining data/frama-c-20200625+scandium/tests/libc/socket_h.c Examining data/frama-c-20200625+scandium/tests/libc/glob_c.c Examining data/frama-c-20200625+scandium/tests/libc/string_c_strchr.c Examining data/frama-c-20200625+scandium/tests/libc/memchr_off.c Examining data/frama-c-20200625+scandium/tests/libc/unistd_h.c Examining data/frama-c-20200625+scandium/tests/libc/socket.c Examining data/frama-c-20200625+scandium/tests/libc/libgen_h.c Examining data/frama-c-20200625+scandium/tests/libc/inttypes_h.c Examining data/frama-c-20200625+scandium/tests/libc/sys_times.c Examining data/frama-c-20200625+scandium/tests/libc/coverage.c Examining data/frama-c-20200625+scandium/tests/libc/time_h.c Examining data/frama-c-20200625+scandium/tests/libc/time_c.c Examining data/frama-c-20200625+scandium/tests/libc/stdlib_c.c Examining data/frama-c-20200625+scandium/tests/libc/alloca_h.c Examining data/frama-c-20200625+scandium/tests/libc/sys_stat_h.c Examining data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c Examining data/frama-c-20200625+scandium/tests/libc/string_h.c Examining data/frama-c-20200625+scandium/tests/libc/netinet_in_h.c Examining data/frama-c-20200625+scandium/tests/libc/poll.c Examining data/frama-c-20200625+scandium/tests/libc/strings_h.c Examining data/frama-c-20200625+scandium/tests/libc/stdlib_h.c Examining data/frama-c-20200625+scandium/tests/libc/more_gcc_builtins.c Examining data/frama-c-20200625+scandium/tests/libc/fc_libc.c Examining data/frama-c-20200625+scandium/tests/libc/inttypes_h2.c Examining data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c Examining data/frama-c-20200625+scandium/tests/libc/stdint_h.c Examining data/frama-c-20200625+scandium/tests/libc/string_c_strstr.c Examining data/frama-c-20200625+scandium/tests/libc/stdio_c.c Examining data/frama-c-20200625+scandium/tests/libc/time_misc.c Examining data/frama-c-20200625+scandium/tests/libc/sys_time_h.c Examining data/frama-c-20200625+scandium/tests/libc/limits_h.c Examining data/frama-c-20200625+scandium/tests/libc/sys_file_h.c Examining data/frama-c-20200625+scandium/tests/libc/assert_h.c Examining data/frama-c-20200625+scandium/tests/libc/sys_types.c Examining data/frama-c-20200625+scandium/tests/libc/wchar_h.c Examining data/frama-c-20200625+scandium/tests/libc/math_h.c Examining data/frama-c-20200625+scandium/tests/libc/stdio_h.c Examining data/frama-c-20200625+scandium/tests/libc/runtime.c Examining data/frama-c-20200625+scandium/tests/libc/pwd_h.c Examining data/frama-c-20200625+scandium/tests/libc/sys_select.c Examining data/frama-c-20200625+scandium/tests/libc/ctype.c Examining data/frama-c-20200625+scandium/tests/libc/signal_h.c Examining data/frama-c-20200625+scandium/tests/libc/string_c_generic.c Examining data/frama-c-20200625+scandium/tests/scope/scope.c Examining data/frama-c-20200625+scandium/tests/scope/zones.c Examining data/frama-c-20200625+scandium/tests/scope/bts383.c Examining data/frama-c-20200625+scandium/tests/scope/bts971.c Examining data/frama-c-20200625+scandium/tests/pdg/top_pdg_input.c Examining data/frama-c-20200625+scandium/tests/pdg/calls_and_struct.c Examining data/frama-c-20200625+scandium/tests/pdg/loops.c Examining data/frama-c-20200625+scandium/tests/pdg/no_body.c Examining data/frama-c-20200625+scandium/tests/pdg/sets.c Examining data/frama-c-20200625+scandium/tests/pdg/calls_and_implicits.c Examining data/frama-c-20200625+scandium/tests/pdg/annot.c Examining data/frama-c-20200625+scandium/tests/pdg/inter_alias.c Examining data/frama-c-20200625+scandium/tests/pdg/call.c Examining data/frama-c-20200625+scandium/tests/pdg/postdom.c Examining data/frama-c-20200625+scandium/tests/pdg/globals.c Examining data/frama-c-20200625+scandium/tests/pdg/dpds_intra.c Examining data/frama-c-20200625+scandium/tests/pdg/dyn_dpds.c Examining data/frama-c-20200625+scandium/tests/pdg/decl_dpds.c Examining data/frama-c-20200625+scandium/tests/pdg/bts1194.c Examining data/frama-c-20200625+scandium/tests/pdg/variadic.c Examining data/frama-c-20200625+scandium/tests/pdg/multiple_calls.c Examining data/frama-c-20200625+scandium/tests/pdg/doc_dot.c Examining data/frama-c-20200625+scandium/tests/pdg/inter_alias2.c Examining data/frama-c-20200625+scandium/tests/pdg/pb_infinite_loop.c Examining data/frama-c-20200625+scandium/tests/pdg/simple_intra_slice.c Examining data/frama-c-20200625+scandium/tests/pdg/simple_call.c Examining data/frama-c-20200625+scandium/tests/more_wp/quicksort.c Examining data/frama-c-20200625+scandium/tests/more_wp/bubblesort.c Examining data/frama-c-20200625+scandium/tests/builtins/malloc_multiple.c Examining data/frama-c-20200625+scandium/tests/builtins/from_result.c Examining data/frama-c-20200625+scandium/tests/builtins/strchr.c Examining data/frama-c-20200625+scandium/tests/builtins/memset.c Examining data/frama-c-20200625+scandium/tests/builtins/alloc.c Examining data/frama-c-20200625+scandium/tests/builtins/gcc_zero_length_array.c Examining data/frama-c-20200625+scandium/tests/builtins/watch.c Examining data/frama-c-20200625+scandium/tests/builtins/malloc_bug_tr.c Examining data/frama-c-20200625+scandium/tests/builtins/malloc-size-zero.c Examining data/frama-c-20200625+scandium/tests/builtins/free.c Examining data/frama-c-20200625+scandium/tests/builtins/imprecise-malloc-free.c Examining data/frama-c-20200625+scandium/tests/builtins/malloc_memexec.c Examining data/frama-c-20200625+scandium/tests/builtins/realloc.c Examining data/frama-c-20200625+scandium/tests/builtins/strnlen2.c Examining data/frama-c-20200625+scandium/tests/builtins/realloc_multiple.c Examining data/frama-c-20200625+scandium/tests/builtins/strlen_align.c Examining data/frama-c-20200625+scandium/tests/builtins/precise_memset.c Examining data/frama-c-20200625+scandium/tests/builtins/strlen.c Examining data/frama-c-20200625+scandium/tests/builtins/alloc-vla.c Examining data/frama-c-20200625+scandium/tests/builtins/allocated.c Examining data/frama-c-20200625+scandium/tests/builtins/memcpy_invalid.c Examining data/frama-c-20200625+scandium/tests/builtins/realloc_imprecise.c Examining data/frama-c-20200625+scandium/tests/builtins/malloc_individual.c Examining data/frama-c-20200625+scandium/tests/builtins/long_init.c Examining data/frama-c-20200625+scandium/tests/builtins/strnlen.c Examining data/frama-c-20200625+scandium/tests/builtins/long_init2.c Examining data/frama-c-20200625+scandium/tests/builtins/memcpy.c Examining data/frama-c-20200625+scandium/tests/builtins/malloc-deps.c Examining data/frama-c-20200625+scandium/tests/builtins/imprecise.c Examining data/frama-c-20200625+scandium/tests/builtins/memchr.c Examining data/frama-c-20200625+scandium/tests/builtins/write-const.c Examining data/frama-c-20200625+scandium/tests/builtins/memset_malloc_0.c Examining data/frama-c-20200625+scandium/tests/builtins/calloc.c Examining data/frama-c-20200625+scandium/tests/builtins/realloc2.c Examining data/frama-c-20200625+scandium/tests/builtins/alloc_weak.c Examining data/frama-c-20200625+scandium/tests/builtins/str_allocated.c Examining data/frama-c-20200625+scandium/tests/builtins/malloc.c Examining data/frama-c-20200625+scandium/tests/builtins/long_init3.c Examining data/frama-c-20200625+scandium/tests/builtins/vla.c Examining data/frama-c-20200625+scandium/tests/builtins/malloc-optimistic.c Examining data/frama-c-20200625+scandium/tests/builtins/memexec-malloc.c Examining data/frama-c-20200625+scandium/tests/builtins/linked_list.c Examining data/frama-c-20200625+scandium/tests/builtins/fam.c Examining data/frama-c-20200625+scandium/tests/builtins/wcslen.c Examining data/frama-c-20200625+scandium/tests/builtins/memcpy2.c Examining data/frama-c-20200625+scandium/tests/impact/topbot.c Examining data/frama-c-20200625+scandium/tests/impact/depend3.c Examining data/frama-c-20200625+scandium/tests/rte_manual/sizeof.c Examining data/frama-c-20200625+scandium/tests/journal/control2.c Examining data/frama-c-20200625+scandium/tests/jcdb/jcdb2.c Examining data/frama-c-20200625+scandium/tests/jcdb/file_without_main.c Examining data/frama-c-20200625+scandium/tests/jcdb/jcdb.c Examining data/frama-c-20200625+scandium/tests/constant_propagation/declaration.c Examining data/frama-c-20200625+scandium/tests/constant_propagation/declaration2.c Examining data/frama-c-20200625+scandium/tests/constant_propagation/const_globals.c Examining data/frama-c-20200625+scandium/tests/constant_propagation/const_propagate.c Examining data/frama-c-20200625+scandium/tests/constant_propagation/introduction_of_non_explicit_cast.c Examining data/frama-c-20200625+scandium/tests/constant_propagation/bts117.c Examining data/frama-c-20200625+scandium/tests/value/simple_packed.c Examining data/frama-c-20200625+scandium/tests/value/array_array.c Examining data/frama-c-20200625+scandium/tests/value/for_loops.c Examining data/frama-c-20200625+scandium/tests/value/any_int.c Examining data/frama-c-20200625+scandium/tests/value/unsigned_overflow.c Examining data/frama-c-20200625+scandium/tests/value/incompatible_states.c Examining data/frama-c-20200625+scandium/tests/value/precond.c Examining data/frama-c-20200625+scandium/tests/value/config.h Examining data/frama-c-20200625+scandium/tests/value/logic.c Examining data/frama-c-20200625+scandium/tests/value/abstract_struct_1.c Examining data/frama-c-20200625+scandium/tests/value/eval_separated.c Examining data/frama-c-20200625+scandium/tests/value/empty_base.c Examining data/frama-c-20200625+scandium/tests/value/arith_pointer.c Examining data/frama-c-20200625+scandium/tests/value/octagons.c Examining data/frama-c-20200625+scandium/tests/value/bigarray.c Examining data/frama-c-20200625+scandium/tests/value/loop3.c Examining data/frama-c-20200625+scandium/tests/value/strucval.c Examining data/frama-c-20200625+scandium/tests/value/auto_loop_unroll.c Examining data/frama-c-20200625+scandium/tests/value/invalid_pointer.c Examining data/frama-c-20200625+scandium/tests/value/no_results.c Examining data/frama-c-20200625+scandium/tests/value/machdep.c Examining data/frama-c-20200625+scandium/tests/value/pragma.c Examining data/frama-c-20200625+scandium/tests/value/sign_of_bitfiled_int.c Examining data/frama-c-20200625+scandium/tests/value/bitwise_float.c Examining data/frama-c-20200625+scandium/tests/value/inline.c Examining data/frama-c-20200625+scandium/tests/value/CruiseControl.c Examining data/frama-c-20200625+scandium/tests/value/attribute-aligned.c Examining data/frama-c-20200625+scandium/tests/value/CruiseControl_extern.h Examining data/frama-c-20200625+scandium/tests/value/volatilestruct.c Examining data/frama-c-20200625+scandium/tests/value/loopinv.c Examining data/frama-c-20200625+scandium/tests/value/builtins_split.c Examining data/frama-c-20200625+scandium/tests/value/equality.c Examining data/frama-c-20200625+scandium/tests/value/tab.c Examining data/frama-c-20200625+scandium/tests/value/limits.c Examining data/frama-c-20200625+scandium/tests/value/align_char_array.c Examining data/frama-c-20200625+scandium/tests/value/abstract_struct_2.c Examining data/frama-c-20200625+scandium/tests/value/config_types.h Examining data/frama-c-20200625+scandium/tests/value/nonlin.c Examining data/frama-c-20200625+scandium/tests/value/cast_axalto.c Examining data/frama-c-20200625+scandium/tests/value/enum2.c Examining data/frama-c-20200625+scandium/tests/value/test_arith.c Examining data/frama-c-20200625+scandium/tests/value/pointer_comparison.c Examining data/frama-c-20200625+scandium/tests/value/empty_struct.c Examining data/frama-c-20200625+scandium/tests/value/initialized.c Examining data/frama-c-20200625+scandium/tests/value/behaviors2.c Examining data/frama-c-20200625+scandium/tests/value/postcond_leaf.c Examining data/frama-c-20200625+scandium/tests/value/replace_by_show_each.c Examining data/frama-c-20200625+scandium/tests/value/va_list.c Examining data/frama-c-20200625+scandium/tests/value/definitions.h Examining data/frama-c-20200625+scandium/tests/value/ptr_call_object.c Examining data/frama-c-20200625+scandium/tests/value/CruiseControl.h Examining data/frama-c-20200625+scandium/tests/value/unop.c Examining data/frama-c-20200625+scandium/tests/value/gauges.c Examining data/frama-c-20200625+scandium/tests/value/inline.h Examining data/frama-c-20200625+scandium/tests/value/addrofstring.c Examining data/frama-c-20200625+scandium/tests/value/volatile.c Examining data/frama-c-20200625+scandium/tests/value/array_access.c Examining data/frama-c-20200625+scandium/tests/value/subset.c Examining data/frama-c-20200625+scandium/tests/value/ineq.c Examining data/frama-c-20200625+scandium/tests/value/redundant_alarms.c Examining data/frama-c-20200625+scandium/tests/value/empty_union.c Examining data/frama-c-20200625+scandium/tests/value/cast_return.c Examining data/frama-c-20200625+scandium/tests/value/numerors/numerors.c Examining data/frama-c-20200625+scandium/tests/value/CruiseControl_const.c Examining data/frama-c-20200625+scandium/tests/value/backward_add_ptr.c Examining data/frama-c-20200625+scandium/tests/value/va_list2.c Examining data/frama-c-20200625+scandium/tests/value/asm_contracts.c Examining data/frama-c-20200625+scandium/tests/value/domains_function.c Examining data/frama-c-20200625+scandium/tests/value/bitfield_longlong.c Examining data/frama-c-20200625+scandium/tests/value/hierarchical_convergence.c Examining data/frama-c-20200625+scandium/tests/value/scade_types.h Examining data/frama-c-20200625+scandium/tests/value/bug0196.c Examining data/frama-c-20200625+scandium/tests/value/local_cleanup.c Examining data/frama-c-20200625+scandium/tests/value/garbled_init.c Examining data/frama-c-20200625+scandium/tests/value/pointer_comp.c Examining data/frama-c-20200625+scandium/tests/value/max_pointed.c Examining data/frama-c-20200625+scandium/tests/value/period.c Examining data/frama-c-20200625+scandium/tests/value/memexec.c Examining data/frama-c-20200625+scandium/tests/value/precond2.c Examining data/frama-c-20200625+scandium/tests/value/threat_redundant.c Examining data/frama-c-20200625+scandium/tests/value/shift_neg.c Examining data/frama-c-20200625+scandium/tests/value/wide_string.c Examining data/frama-c-20200625+scandium/tests/value/traces/test1.c Examining data/frama-c-20200625+scandium/tests/value/packed.c Examining data/frama-c-20200625+scandium/tests/value/interpol.c Examining data/frama-c-20200625+scandium/tests/value/partitioning-annots.c Examining data/frama-c-20200625+scandium/tests/value/empty_struct2.c Examining data/frama-c-20200625+scandium/tests/value/recol.c Examining data/frama-c-20200625+scandium/tests/rte/bts621.c Examining data/frama-c-20200625+scandium/tests/rte/gnu_zero_length.c Examining data/frama-c-20200625+scandium/tests/rte/array_index.c Examining data/frama-c-20200625+scandium/tests/rte/noresult.c Examining data/frama-c-20200625+scandium/tests/rte/reqlabl2.c Examining data/frama-c-20200625+scandium/tests/rte/precond.c Examining data/frama-c-20200625+scandium/tests/rte/sizeof.c Examining data/frama-c-20200625+scandium/tests/rte/threefunc.c Examining data/frama-c-20200625+scandium/tests/rte/initialized_union.c Examining data/frama-c-20200625+scandium/tests/rte/addsub_unsigned.c Examining data/frama-c-20200625+scandium/tests/rte/castoncall.c Examining data/frama-c-20200625+scandium/tests/rte/minus.c Examining data/frama-c-20200625+scandium/tests/rte/shift_machdep.c Examining data/frama-c-20200625+scandium/tests/rte/bts0567.c Examining data/frama-c-20200625+scandium/tests/rte/assign6.c Examining data/frama-c-20200625+scandium/tests/rte/twofunc3.c Examining data/frama-c-20200625+scandium/tests/rte/tab.c Examining data/frama-c-20200625+scandium/tests/rte/assign4.c Examining data/frama-c-20200625+scandium/tests/rte/addsub_typedef.c Examining data/frama-c-20200625+scandium/tests/rte/valid.c Examining data/frama-c-20200625+scandium/tests/rte/postcond.c Examining data/frama-c-20200625+scandium/tests/rte/float_to_int.c Examining data/frama-c-20200625+scandium/tests/rte/assign3.c Examining data/frama-c-20200625+scandium/tests/rte/divmod_typedef.c Examining data/frama-c-20200625+scandium/tests/rte/fptr_assert.c Examining data/frama-c-20200625+scandium/tests/rte/s64.c Examining data/frama-c-20200625+scandium/tests/rte/assign5.c Examining data/frama-c-20200625+scandium/tests/rte/bts0580_2.c Examining data/frama-c-20200625+scandium/tests/rte/downcast.c Examining data/frama-c-20200625+scandium/tests/rte/initialized.c Examining data/frama-c-20200625+scandium/tests/rte/assign2.c Examining data/frama-c-20200625+scandium/tests/rte/twofunc.c Examining data/frama-c-20200625+scandium/tests/rte/memaccess.c Examining data/frama-c-20200625+scandium/tests/rte/mul.c Examining data/frama-c-20200625+scandium/tests/rte/addsub_unsigned_typedef.c Examining data/frama-c-20200625+scandium/tests/rte/assign.c Examining data/frama-c-20200625+scandium/tests/rte/assign7.c Examining data/frama-c-20200625+scandium/tests/rte/bts1052.c Examining data/frama-c-20200625+scandium/tests/rte/divmod.c Examining data/frama-c-20200625+scandium/tests/rte/malloc.c Examining data/frama-c-20200625+scandium/tests/rte/shift.c Examining data/frama-c-20200625+scandium/tests/rte/shift_unsigned.c Examining data/frama-c-20200625+scandium/tests/rte/addsub.c Examining data/frama-c-20200625+scandium/tests/rte/finite_float.c Examining data/frama-c-20200625+scandium/tests/rte/bts0576.c Examining data/frama-c-20200625+scandium/tests/rte/precond2.c Examining data/frama-c-20200625+scandium/tests/rte/postcond2.c Examining data/frama-c-20200625+scandium/tests/rte/value_rte.c Examining data/frama-c-20200625+scandium/tests/rte/reqlabl.c Examining data/frama-c-20200625+scandium/tests/fc_script/for-find-fun2.c Examining data/frama-c-20200625+scandium/tests/fc_script/main3.c Examining data/frama-c-20200625+scandium/tests/fc_script/for-find-fun.c Examining data/frama-c-20200625+scandium/tests/fc_script/main.c Examining data/frama-c-20200625+scandium/tests/fc_script/main2.c Examining data/frama-c-20200625+scandium/tests/metrics/cyclo_comp5.c Examining data/frama-c-20200625+scandium/tests/metrics/variadic-stdlib-generated.c Examining data/frama-c-20200625+scandium/tests/metrics/reach.c Examining data/frama-c-20200625+scandium/tests/metrics/used-files1.h Examining data/frama-c-20200625+scandium/tests/metrics/used-files10.c Examining data/frama-c-20200625+scandium/tests/metrics/libc.c Examining data/frama-c-20200625+scandium/tests/metrics/used-files9.c Examining data/frama-c-20200625+scandium/tests/metrics/unreachable.c Examining data/frama-c-20200625+scandium/tests/metrics/func_ptr.c Examining data/frama-c-20200625+scandium/tests/metrics/used-files2.h Examining data/frama-c-20200625+scandium/tests/idct/ieee_1180_1990.c Examining data/frama-c-20200625+scandium/tests/idct/idct.c Examining data/frama-c-20200625+scandium/tests/pretty_printing/ghost_parameters.c Examining data/frama-c-20200625+scandium/tests/pretty_printing/parenthesis.c Examining data/frama-c-20200625+scandium/tests/pretty_printing/relations.c Examining data/frama-c-20200625+scandium/tests/pretty_printing/binary_logic_op.c Examining data/frama-c-20200625+scandium/tests/float/special_floats.c Examining data/frama-c-20200625+scandium/tests/float/nonlin.c Examining data/frama-c-20200625+scandium/tests/float/sqrt.c Examining data/frama-c-20200625+scandium/tests/float/cond.c Examining data/frama-c-20200625+scandium/tests/float/cond_cast_int_to_float.c Examining data/frama-c-20200625+scandium/tests/float/widen.c Examining data/frama-c-20200625+scandium/tests/float/math_builtins.c Examining data/frama-c-20200625+scandium/tests/float/builtins.c Examining data/frama-c-20200625+scandium/tests/float/precise_cos_sin.c Examining data/frama-c-20200625+scandium/tests/float/some.c Examining data/frama-c-20200625+scandium/tests/float/absorb.c FINAL RESULTS: data/frama-c-20200625+scandium/share/libc/stdio.h:320:14: [5] (buffer) gets: Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead. extern char *gets(char *s); data/frama-c-20200625+scandium/share/libc/sys/stat.h:32:15: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. extern int chmod(const char *, mode_t); data/frama-c-20200625+scandium/share/libc/unistd.h:779:21: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. extern int chown(const char *path, uid_t owner, gid_t group); data/frama-c-20200625+scandium/share/libc/unistd.h:1014:21: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. extern int readlink(const char *, char *, size_t); data/frama-c-20200625+scandium/tests/libc/unistd_h.c:88:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. r = chown("/tmp/a.txt", 01000, 01000); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:80:11: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. len = readlink(namebuf, linkpath, MAXPATHLEN); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:80:11: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. len = readlink(namebuf, linkpath, MAXPATHLEN); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:60:11: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. len = readlink(namebuf, linkpath, MAXPATHLEN); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:60:11: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. len = readlink(namebuf, linkpath, MAXPATHLEN); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:17:11: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. len = readlink(namebuf, linkpath, MAXPATHLEN); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:17:11: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. len = readlink(namebuf, linkpath, MAXPATHLEN); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/wu-ftpd.c:27:5: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. int readlink(const char *path, char *buf, int bufsiz) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/wu-ftpd.h:15:5: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. int readlink(const char *path, char *buf, int bufsiz); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:56:13: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. n = readlink(tmp, resolved, MAXPATHLEN); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:56:13: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. n = readlink(tmp, resolved, MAXPATHLEN); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/wu-ftpd.c:7:5: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. int readlink(const char *path, char *buf, int bufsiz) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/wu-ftpd.h:10:5: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. int readlink(const char *path, char *buf, int bufsiz); data/frama-c-20200625+scandium/share/libc/stdio.h:207:12: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int fprintf(FILE * restrict stream, data/frama-c-20200625+scandium/share/libc/stdio.h:209:12: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int fscanf(FILE * restrict stream, data/frama-c-20200625+scandium/share/libc/stdio.h:211:12: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int printf(const char * restrict format, ...); data/frama-c-20200625+scandium/share/libc/stdio.h:212:12: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int scanf(const char * restrict format, ...); data/frama-c-20200625+scandium/share/libc/stdio.h:213:12: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. extern int snprintf(char * restrict s, size_t n, data/frama-c-20200625+scandium/share/libc/stdio.h:215:12: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. extern int sprintf(char * restrict s, data/frama-c-20200625+scandium/share/libc/stdio.h:217:12: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int sscanf(const char * restrict s, data/frama-c-20200625+scandium/share/libc/stdio.h:221:12: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int vfprintf(FILE * restrict stream, data/frama-c-20200625+scandium/share/libc/stdio.h:227:12: [4] (buffer) vfscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int vfscanf(FILE * restrict stream, data/frama-c-20200625+scandium/share/libc/stdio.h:232:12: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int vprintf(const char * restrict format, data/frama-c-20200625+scandium/share/libc/stdio.h:237:12: [4] (buffer) vscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int vscanf(const char * restrict format, data/frama-c-20200625+scandium/share/libc/stdio.h:242:12: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. extern int vsnprintf(char * restrict s, size_t n, data/frama-c-20200625+scandium/share/libc/stdio.h:248:12: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. extern int vsprintf(char * restrict s, data/frama-c-20200625+scandium/share/libc/stdio.h:253:12: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int vsscanf(const char * restrict s, data/frama-c-20200625+scandium/share/libc/stdio.h:559:14: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern FILE *popen(const char *command, const char *type); data/frama-c-20200625+scandium/share/libc/stdlib.h:528:12: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern int system(const char *command); data/frama-c-20200625+scandium/share/libc/string.c:179:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char* strcat(char *dest, const char *src) data/frama-c-20200625+scandium/share/libc/string.c:204:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char* strcpy(char *dest, const char *src) data/frama-c-20200625+scandium/share/libc/string.h:360:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). extern char *strcpy(char *restrict dest, const char *restrict src); data/frama-c-20200625+scandium/share/libc/string.h:420:14: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). extern char *strcat(char *restrict dest, const char *restrict src); data/frama-c-20200625+scandium/share/libc/syslog.h:142:14: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. extern void syslog(int, const char *, ...); data/frama-c-20200625+scandium/share/libc/unistd.h:744:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. extern int access(const char *path, int amode); data/frama-c-20200625+scandium/share/libc/unistd.h:789:21: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. extern char *crypt(const char *, const char *); data/frama-c-20200625+scandium/share/libc/unistd.h:791:21: [4] (misc) cuserid: Exactly what cuserid() does is poorly defined (e.g., some systems use the effective uid, like Linux, while others like System V use the real uid). Thus, you can't trust what it does. It's certainly not portable (The cuserid function was included in the 1988 version of POSIX, but removed from the 1990 version). Also, if passed a non-null parameter, there's a risk of a buffer overflow if the passed-in buffer is not at least L_cuserid characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired information instead. extern char *cuserid(char *s); data/frama-c-20200625+scandium/share/libc/unistd.h:817:21: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern int execl(const char *path, const char *arg, ...); data/frama-c-20200625+scandium/share/libc/unistd.h:822:21: [4] (shell) execle: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern int execle(const char *path, const char *arg, ...); data/frama-c-20200625+scandium/share/libc/unistd.h:827:21: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern int execlp(const char *path, const char *arg, ...); data/frama-c-20200625+scandium/share/libc/unistd.h:832:21: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern int execv(const char *path, char *const argv[]); data/frama-c-20200625+scandium/share/libc/unistd.h:842:21: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern int execvp(const char *path, char *const argv[]); data/frama-c-20200625+scandium/share/libc/unistd.h:917:21: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. extern char *getlogin(void); data/frama-c-20200625+scandium/share/libc/unistd.h:920:21: [4] (misc) getpass: This function is obsolete and not portable. It was in SUSv2 but removed by POSIX.2. What it does exactly varies considerably between systems, particularly in where its prompt is displayed and where it gets its data (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do exactly what you want. If you continue to use it, or write your own, be sure to zero the password as soon as possible to avoid leaving the cleartext password visible in the process' address space. extern char *getpass(const char *); data/frama-c-20200625+scandium/share/libc/wchar.c:43:10: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wchar_t* wcscpy(wchar_t *dest, const wchar_t *src) data/frama-c-20200625+scandium/share/libc/wchar.c:71:11: [4] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). wchar_t * wcscat(wchar_t *dest, const wchar_t *src) data/frama-c-20200625+scandium/share/libc/wchar.h:117:18: [4] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). extern wchar_t * wcscat(wchar_t *restrict dest, const wchar_t *restrict src); data/frama-c-20200625+scandium/share/libc/wchar.h:142:18: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. extern wchar_t * wcscpy(wchar_t *restrict dest, const wchar_t *restrict src); data/frama-c-20200625+scandium/share/libc/wchar.h:265:12: [4] (format) fwprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int fwprintf(FILE * stream, const wchar_t * format, ...); data/frama-c-20200625+scandium/share/libc/wchar.h:267:12: [4] (format) swprintf: Potential format string problem (CWE-134). Make format string constant. extern int swprintf(wchar_t * ws, size_t n, const wchar_t * format, ...); data/frama-c-20200625+scandium/share/libc/wchar.h:269:12: [4] (format) wprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int wprintf(const wchar_t * format, ...); data/frama-c-20200625+scandium/share/libc/wchar.h:272:12: [4] (buffer) wscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int wscanf(const wchar_t * format, ...); data/frama-c-20200625+scandium/share/libc/wchar.h:274:12: [4] (buffer) fwscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int fwscanf(FILE * stream, const wchar_t * format, ...); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:944:10: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vprintf(fmt, ap); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:967:10: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(stream, fmt, ap); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:990:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int len = vsnprintf(NULL, 0, fmt, ap); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:997:10: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. return vsprintf(buffer, fmt, ap); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:1011:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. return vsnprintf(buffer, size, fmt, ap); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:205:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). return strcpy(dest, src); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:249:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). return strcat(dest, src); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_shexec.h:139:5: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(data->argv[0],data->argv); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:48:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). # define strcat __builtin_strcat data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:52:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). # define strcpy __builtin_strcpy data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1398.c:29:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__gen_e_acsl_literal_string,x,t[0],t[i]); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:36:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. OK(sprintf(buf, "-%s-", "1")); // 4 chars, fits data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:37:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. OK(sprintf(buf, "-%s-", "12")); // 5 chars, still fits data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:38:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ABRT(sprintf(buf, "-%s-", "123")); // 6 chars, no space for NUL data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:39:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ABRT(sprintf(NULL, "-%s-", "123")); // try NULL data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:40:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ABRT(sprintf(pstr, "-%s-", "123")); // try read-only data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:29:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, 1.0); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:31:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, 1U); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:33:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, 97); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:35:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, "foo"); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:37:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, &n); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:39:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(format, p); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:52:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(format, fmt); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:194:8: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. ABRT(printf(fmt, pstr)); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_constructor.c:9:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__gen_e_acsl_literal_string); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_constructor.c:38:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__gen_e_acsl_literal_string_2); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_goto.c:43:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__gen_e_acsl_literal_string_2,t,__gen_e_acsl_literal_string); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_goto.c:61:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__gen_e_acsl_literal_string_2,t,__gen_e_acsl_literal_string_3); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_local_goto.c:77:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__gen_e_acsl_literal_string_2,t,__gen_e_acsl_literal_string_4); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_malloc-asan.c:60:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__gen_e_acsl_literal_string,p,counter); data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:17:5: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. scanf("%"SCNd##KIND##size,&x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:18:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("%"PRId##KIND##size,x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:19:5: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. scanf("%"SCNi##KIND##size,&x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:20:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("%"PRIi##KIND##size,x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:25:4: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. scanf("%"SCNo##KIND##size,&x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:26:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("%"PRIo##KIND##size,x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:27:4: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. scanf("%"SCNu##KIND##size,&x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:28:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("%"PRIu##KIND##size,x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:29:4: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. scanf("%"SCNx##KIND##size,&x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:30:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("%"PRIx##KIND##size,x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:31:4: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. scanf("%"SCNx##KIND##size,&x); \ data/frama-c-20200625+scandium/tests/libc/inttypes_h.c:32:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("%"PRIX##KIND##size,x); \ data/frama-c-20200625+scandium/tests/libc/string_c.c:132:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s+5); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:56:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). TEST(s, strcpy(b, b+16), b, "wrong return %p != %p"); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:58:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). TEST(s, strcpy(b+1, b+16), b+1, "wrong return %p != %p"); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:60:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). TEST(s, strcpy(b+2, b+16), b+2, "wrong return %p != %p"); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:62:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). TEST(s, strcpy(b+3, b+16), b+3, "wrong return %p != %p"); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:65:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). TEST(s, strcpy(b+1, b+17), b+1, "wrong return %p != %p"); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:67:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). TEST(s, strcpy(b+2, b+18), b+2, "wrong return %p != %p"); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:69:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). TEST(s, strcpy(b+3, b+19), b+3, "wrong return %p != %p"); data/frama-c-20200625+scandium/tests/libc/string_h.c:16:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(string2, string); data/frama-c-20200625+scandium/tests/libc/string_h.c:53:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest, src); // must produce at least a warning data/frama-c-20200625+scandium/tests/libc/unistd_h.c:17:3: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/sh", "sh", "-c", "ls", (char*)0); data/frama-c-20200625+scandium/tests/libc/unistd_h.c:19:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. r = access("/tmp", R_OK | W_OK | X_OK); data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:38:23: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. if (nondet) { res = wcscpy(buf, sc2); goto exit; } data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:52:23: [4] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). if (nondet) { res = wcscat(buf, sc2); goto exit; } data/frama-c-20200625+scandium/tests/metrics/cyclo_comp5.c:5:6: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void printf(const char *format); data/frama-c-20200625+scandium/tests/misc/pragma-pack-utils.h:32:16: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define PRINTF printf data/frama-c-20200625+scandium/tests/pdg/calls_and_implicits.c:21:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int printf(const char * restrict format, ...); data/frama-c-20200625+scandium/tests/slicing/unitialized.c:9:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int printf(const char*, int y); data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:41:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char* strcpy(char* dest, char* src) { data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:70:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest,src); data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:97:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest,src); data/frama-c-20200625+scandium/tests/spec/at_exit.c:11:12: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int printf (__const char *__restrict __format, ...); data/frama-c-20200625+scandium/tests/spec/printf_assigns.c:10:12: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int printf (__const char *__restrict __format, ...); data/frama-c-20200625+scandium/tests/syntax/multiple_decls_contracts.c:16:20: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). return strcpy(copy, str); data/frama-c-20200625+scandium/tests/value/definitions.h:21:12: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int printf(const char *, ...); data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:109:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat(char *dest, const char *src) data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:192:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy (char *dest, char *src) data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:24:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy (char *dest, const char *src); data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:28:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat(char *dest, const char *src); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:89:31: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #pragma ccuredvararg("scanf", printf(1)) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c:32:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy (buf + j, login); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c:32:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy (buf + j, login); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/complete/util-bad.c:121:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(bp, login); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:23:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:71:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:23:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:71:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:23:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:51:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:23:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:51:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:23:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:71:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:23:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:71:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:23:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:51:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:23:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:51:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:19:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:20:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:19:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curpath, pathname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:20:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(namebuf, workpath); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:19:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wbuf, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:19:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wbuf, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:29:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wbuf, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:29:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wbuf, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:44:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wbuf, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:44:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wbuf, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:55:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:74:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wbuf, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:55:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, resolved + p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:74:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wbuf, resolved + p); data/frama-c-20200625+scandium/share/libc/getopt.h:50:12: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt_long (int argc, char *const argv[], data/frama-c-20200625+scandium/share/libc/stdio.h:116:14: [3] (tmpfile) tmpnam: Temporary file race condition (CWE-377). extern char *tmpnam(char *s); data/frama-c-20200625+scandium/share/libc/stdlib.c:100:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *getenv(const char *name) data/frama-c-20200625+scandium/share/libc/stdlib.h:275:13: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern void srand(unsigned int seed); data/frama-c-20200625+scandium/share/libc/stdlib.h:281:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern long int random(void); data/frama-c-20200625+scandium/share/libc/stdlib.h:284:13: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern void srandom(unsigned int seed); data/frama-c-20200625+scandium/share/libc/stdlib.h:307:24: [3] (random) seed48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern unsigned short *seed48(unsigned short seed16v[3]); data/frama-c-20200625+scandium/share/libc/stdlib.h:314:13: [3] (random) lcong48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern void lcong48(unsigned short param[7]); data/frama-c-20200625+scandium/share/libc/stdlib.h:322:15: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern double drand48(void); data/frama-c-20200625+scandium/share/libc/stdlib.h:330:15: [3] (random) erand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern double erand48(unsigned short xsubi[3]); data/frama-c-20200625+scandium/share/libc/stdlib.h:338:17: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern long int lrand48 (void); data/frama-c-20200625+scandium/share/libc/stdlib.h:346:17: [3] (random) nrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern long int nrand48 (unsigned short xsubi[3]); data/frama-c-20200625+scandium/share/libc/stdlib.h:354:17: [3] (random) mrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern long int mrand48 (void); data/frama-c-20200625+scandium/share/libc/stdlib.h:362:17: [3] (random) jrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. extern long int jrand48 (unsigned short xsubi[3]); data/frama-c-20200625+scandium/share/libc/stdlib.h:490:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. extern char *getenv(const char *name); data/frama-c-20200625+scandium/share/libc/unistd.h:767:21: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. extern int chroot(const char *path); data/frama-c-20200625+scandium/share/libc/unistd.h:952:21: [3] (buffer) getwd: This does not protect against buffer overflows by itself, so use with caution (CWE-120, CWE-20). Use getcwd instead. extern char *getwd(char *); data/frama-c-20200625+scandium/share/libc/unistd.h:1200:12: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. extern int getopt(int argc, char * const argv[], const char *optstring); data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:2047:32: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. #define ACQUIRE_LOCK(lk) (EnterCriticalSection(lk), 0) data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:2066:7: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. InitializeCriticalSection(&malloc_global_mutex); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/hidden_malloc.c:15:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char *cwd = realpath(".", NULL); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_hidden_malloc.c:10:34: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. extern int ( /* missing proto */ realpath)(char const *x_0, void *x_1); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_hidden_malloc.c:31:9: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. tmp = realpath(__gen_e_acsl_literal_string,(void *)0); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_lib.c:10:34: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. extern int ( /* missing proto */ realpath)(char *x_0, char *x_1); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_lib.c:87:11: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. tmp_0 = realpath(c,q); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_fun_lib.c:96:11: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. tmp_1 = realpath(c,q); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fun_lib.c:20:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char *path = realpath(c, q); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_fun_lib.c:21:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. path = realpath(c, q); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_getenv.c:10:8: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. g1 = getenv("HOME"); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_getenv.c:11:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *g2 = getenv("PATH"); data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:11:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *r1 = getenv("BLA"); data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:16:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *r2 = getenv("BLA"); data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:25:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *r3 = getenv(r2); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:86:5: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. drand48(); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:90:5: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. lrand48(); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:94:5: [3] (random) mrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. mrand48(); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:99:5: [3] (random) erand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. erand48(xsubi); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:104:7: [3] (random) erand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. d = erand48(xsubi); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:106:7: [3] (random) jrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. l = jrand48(xsubi); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:108:7: [3] (random) nrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. l = nrand48(xsubi); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:113:25: [3] (random) seed48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. unsigned short *res = seed48(seed48v); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:115:3: [3] (random) lcong48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. lcong48(param); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:117:7: [3] (random) drand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. d = drand48(); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:119:7: [3] (random) mrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. l = mrand48(); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:121:7: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. l = lrand48(); data/frama-c-20200625+scandium/tests/libc/unistd_h.c:92:7: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. r = chroot("/tmp"); data/frama-c-20200625+scandium/tests/metrics/libc.c:26:5: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int getopt(int argc, char * const argv[], data/frama-c-20200625+scandium/tests/metrics/libc.c:33:3: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. getopt(0, 0, 0); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/my-main.c:89:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((j = getopt(argc, argv, OPTIONS)) != -1) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:7:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:35:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:7:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:35:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:112:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:118:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:92:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:98:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:49:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:55:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:95:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:95:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:76:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:75:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:39:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:4:1: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(const char *pathname, char *result, char* chroot_path) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:39:3: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. realpath(pathname, result, chroot_path); data/frama-c-20200625+scandium/share/analysis-scripts/examples/example.c:3:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[10], t[10]; data/frama-c-20200625+scandium/share/analysis-scripts/examples/example.c:8:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t, s, 10); data/frama-c-20200625+scandium/share/analysis-scripts/fc_stubs.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char argv0[256], argv1[256], argv2[256], argv3[256], argv4[256]; data/frama-c-20200625+scandium/share/analysis-scripts/fc_stubs.c:15:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[6] = {argv0, argv1, argv2, argv3, argv4, 0}; data/frama-c-20200625+scandium/share/libc/__fc_define_sockaddr.h:31:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sa_data[14]; /* 14 bytes of protocol address */ data/frama-c-20200625+scandium/share/libc/__fc_inet.h:252:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip_opts[40]; /* Actually variable in size. */ data/frama-c-20200625+scandium/share/libc/__fc_inet.h:362:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. volatile char __fc_inet_ntoa_array[16]; data/frama-c-20200625+scandium/share/libc/dirent.h:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[256]; /* filename */ data/frama-c-20200625+scandium/share/libc/fcntl.h:120:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). extern int open(const char *filename, int flags, ...); data/frama-c-20200625+scandium/share/libc/libgen.h:31:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_basename[__FC_PATH_MAX]; data/frama-c-20200625+scandium/share/libc/libgen.h:43:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_dirname[__FC_PATH_MAX]; data/frama-c-20200625+scandium/share/libc/net/if.h:115:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifrn_name[IFNAMSIZ]; /* Interface name, e.g. "en0". */ data/frama-c-20200625+scandium/share/libc/net/if.h:128:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifru_slave[IFNAMSIZ]; /* Just fits the size */ data/frama-c-20200625+scandium/share/libc/net/if.h:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifru_newname[IFNAMSIZ]; data/frama-c-20200625+scandium/share/libc/netdb.c:86:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char host_addr[sizeof(struct in_addr)]; data/frama-c-20200625+scandium/share/libc/netdb.c:87:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *h_addr_ptrs[__FC_MAX_HOST_ADDRS + 1]; data/frama-c-20200625+scandium/share/libc/netdb.c:88:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *host_aliases[__FC_MAX_HOST_ALIASES]; data/frama-c-20200625+scandium/share/libc/netdb.c:89:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostbuf[__FC_HOSTBUF_SIZE]; data/frama-c-20200625+scandium/share/libc/netdb.c:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[__FC_QUERYBUF_SIZE]; data/frama-c-20200625+scandium/share/libc/netdb.c:122:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__fc_ghbn.host_addr, &addr, __fc_ghbn.host.h_length); data/frama-c-20200625+scandium/share/libc/netdb.c:146:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__fc_ghbn.host_addr, &addr, __fc_ghbn.host.h_length); data/frama-c-20200625+scandium/share/libc/pwd.h:47:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_getpwuid_pw_name[64]; data/frama-c-20200625+scandium/share/libc/pwd.h:48:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_getpwuid_pw_passwd[64]; data/frama-c-20200625+scandium/share/libc/pwd.h:49:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_getpwuid_pw_dir[64]; data/frama-c-20200625+scandium/share/libc/pwd.h:50:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_getpwuid_pw_shell[64]; data/frama-c-20200625+scandium/share/libc/semaphore.h:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __size[16]; data/frama-c-20200625+scandium/share/libc/stdio.h:99:14: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). extern FILE *tmpfile(void); data/frama-c-20200625+scandium/share/libc/stdio.h:101:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __fc_tmpnam[L_tmpnam]; data/frama-c-20200625+scandium/share/libc/stdio.h:157:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). extern FILE *fopen(const char * restrict filename, data/frama-c-20200625+scandium/share/libc/stdlib.c:39:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int atoi(const char *p) data/frama-c-20200625+scandium/share/libc/stdlib.c:77:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *__fc_env[ARG_MAX] __attribute__((FRAMA_C_MODEL)); data/frama-c-20200625+scandium/share/libc/stdlib.c:81:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __fc_env_strings[__FC_INITENV_LEN]; data/frama-c-20200625+scandium/share/libc/stdlib.h:81:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). extern int atoi(const char *nptr); data/frama-c-20200625+scandium/share/libc/stdlib.h:87:17: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). extern long int atol(const char *nptr); data/frama-c-20200625+scandium/share/libc/stdlib.h:483:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char *__fc_env[ARG_MAX] __attribute__((FRAMA_C_MODEL)); data/frama-c-20200625+scandium/share/libc/stdlib.h:700:12: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). extern int mkstemp(char *templat); data/frama-c-20200625+scandium/share/libc/string.c:30:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void* memcpy(void* restrict dest, const void* restrict src, size_t n) data/frama-c-20200625+scandium/share/libc/string.c:133:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (((unsigned char *)s1)[i] - ((unsigned char *)s2)[i]); data/frama-c-20200625+scandium/share/libc/string.c:133:49: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (((unsigned char *)s1)[i] - ((unsigned char *)s2)[i]); data/frama-c-20200625+scandium/share/libc/string.c:140:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((unsigned char *)s1)[i] - ((unsigned char *)s2)[i]; data/frama-c-20200625+scandium/share/libc/string.c:140:52: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return ((unsigned char *)s1)[i] - ((unsigned char *)s2)[i]; data/frama-c-20200625+scandium/share/libc/string.c:274:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __fc_strerror[64]; data/frama-c-20200625+scandium/share/libc/string.c:298:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, l); data/frama-c-20200625+scandium/share/libc/string.c:315:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, s, l); data/frama-c-20200625+scandium/share/libc/string.c:320:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __fc_strsignal[64]; data/frama-c-20200625+scandium/share/libc/string.h:101:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. extern void *memcpy(void *restrict dest, data/frama-c-20200625+scandium/share/libc/string.h:336:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_strerror[64]; data/frama-c-20200625+scandium/share/libc/string.h:514:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_strsignal[64]; data/frama-c-20200625+scandium/share/libc/strings.h:33:15: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. extern void bcopy(const void *, void *, size_t); data/frama-c-20200625+scandium/share/libc/stropts.h:76:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char l_name[FMNAMESZ+1]; data/frama-c-20200625+scandium/share/libc/sys/time.h:54:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern int utimes(const char *path, const struct timeval times[2]); data/frama-c-20200625+scandium/share/libc/sys/un.h:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sun_path[108]; /* Path name. */ data/frama-c-20200625+scandium/share/libc/sys/utsname.h:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysname[_FC_UTSNAME_LENGTH]; data/frama-c-20200625+scandium/share/libc/sys/utsname.h:35:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodename[_FC_UTSNAME_LENGTH]; data/frama-c-20200625+scandium/share/libc/sys/utsname.h:36:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char release[_FC_UTSNAME_LENGTH]; data/frama-c-20200625+scandium/share/libc/sys/utsname.h:37:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[_FC_UTSNAME_LENGTH]; data/frama-c-20200625+scandium/share/libc/sys/utsname.h:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine[_FC_UTSNAME_LENGTH]; data/frama-c-20200625+scandium/share/libc/time.c:27:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __fc_ctime[26]; data/frama-c-20200625+scandium/share/libc/time.h:111:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __fc_ctime[26]; data/frama-c-20200625+scandium/share/libc/time.h:304:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char *tzname[2]; data/frama-c-20200625+scandium/share/libc/unistd.c:27:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. volatile char __fc_ttyname[TTY_NAME_MAX]; data/frama-c-20200625+scandium/share/libc/unistd.h:897:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern volatile char __fc_hostname[HOST_NAME_MAX]; data/frama-c-20200625+scandium/share/libc/unistd.h:1099:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern volatile char __fc_ttyname[TTY_NAME_MAX]; data/frama-c-20200625+scandium/share/libc/unistd.h:1129:21: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. extern pid_t vfork(void); data/frama-c-20200625+scandium/share/libc/utmpx.h:37:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ut_user[32]; data/frama-c-20200625+scandium/share/libc/utmpx.h:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ut_id[4]; data/frama-c-20200625+scandium/share/libc/utmpx.h:39:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ut_line[32]; data/frama-c-20200625+scandium/share/libc/utmpx.h:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ut_host[256]; // not POSIX, but allowed by it, and present in glibc data/frama-c-20200625+scandium/share/libc/wchar.h:279:46: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef struct __fc_mbstate_t { int __count; char __value[4]; } mbstate_t; data/frama-c-20200625+scandium/share/machdep.c:278:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ca[2]; data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:1729:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). (dev_zero_fd = open("/dev/zero", O_RDWR), \ data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:3233:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[sizeof(size_t)]; data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:3235:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open("/dev/urandom", O_RDONLY)) >= 0 && data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:5290:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem, oldmem, (oc < bytes)? oc : bytes); data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:5846:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem, oldmem, (oc < bytes)? oc : bytes); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_assert.h:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [strlen(fmt) + strlen(afmt) + PATH_MAX + 11]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_debug.h:89:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dlog_fd = open(dlog_name, O_WRONLY | O_CREAT | O_TRUNC |O_NONBLOCK data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:232:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format_char_map[256]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:266:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char directive [16]; /* Directive string */ data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:653:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lm_kind[3]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:278:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return memcpy(dest, src, n); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_printf.h:273:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bf[256]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:45:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy __builtin_memcpy data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:64:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest + strlen(dest), src, strlen(src) + 1); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:73:40: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return (n == NULL) ? NULL : (char*)memcpy(n, s, len); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:119:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char zeroblock [ZERO_BLOCK_SIZE]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_temporal.h:73:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest_shadow, src_shadow, size); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_trace.h:78:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char executable [PATH_MAX]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h:952:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. return memcpy(ret, ptr, size); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h:1063:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_init_shadow, old_init_shadow, copy_size); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h:1348:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prim_buf[256]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_tracking.h:1349:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sec_buf[256]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1386_complex_flowgraph.c:69:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source[ARRAYSIZE]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1386_complex_flowgraph.c:70:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[ARRAYSIZE]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1399.c:8:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char __attribute__((__aligned__(32))) state[1600 / 8] ; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts1399.c:9:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char __attribute__((__aligned__(32))) dataQueue[1536 / 8] ; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2192.c:10:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). a = argc = atoi(n); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2406.c:6:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[10]; /* monitored */ data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1304.c:32:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[sizeof(union msg)]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1386_complex_flowgraph.c:260:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source[100]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1386_complex_flowgraph.c:261:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[100]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1399.c:5:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char __attribute__((__aligned__(32))) state[1600 / 8] ; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts1399.c:6:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char __attribute__((__aligned__(32))) dataQueue[1536 / 8] ; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2406.c:5:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[10]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char template [256]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:19:14: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). FILE *fh = tmpfile(); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/fprintf.c:35:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[5]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_fprintf.c:210:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char template[256]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_fprintf.c:211:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[5]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf.c:2214:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char astr[13] = data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf.c:2365:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[7] = data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/oracle_ci/gen_printf.c:6418:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s4[4] = {(char)'c', (char)'a', (char)'t', (char)'\000'}; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[len + 1]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:192:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[7] = "fmt:%s"; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:418:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s4[4] = "cat"; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:438:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t ls4[4] = L"cat"; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/compound_initializers.c:9:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_A[2] = { "XX", "YY" }; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/freeable.c:10:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char array[1024]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_compound_initializers.c:15:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_A[2] = {(char *)"XX", (char *)"YY"}; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/oracle_ci/gen_freeable.c:4:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char array[1024]; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_global_init.c:55:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *strings[2][2] = {{"the", "tha"}, {"thi", "tho"}}; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c:50:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *Strings[2][2] = data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c:52:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *Str[4] = {(char *)"foo", (char *)"bar", (char *)"baz", (char *)0}; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c:120:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *strings[2][2] = data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/oracle_ci/gen_t_local_init.c:188:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *str[4] = data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_global_init.c:42:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * strings [2][2] = { data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c:26:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * Strings [2][2] = { data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c:31:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * Str [4] = { "foo", "bar", "baz", NULL }; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * strings [2][2] = { data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_local_init.c:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * str [4] = { "foo", "bar", "baz", NULL }; data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_memcpy.c:25:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dest, &src, size); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/temporal/t_memcpy.c:48:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(q, p, size); data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.old.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seen[BOUND]; data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.old.v2.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seen[BOUND]; data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_gallery/frama_c_exo3_solved.simplified.c:56:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seen[BOUND]; data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/subset_fopen.c:13:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fopen(const char * restrict filename, data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_plugin/subset_fopen.c:25:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* p = fopen ("bla", 0); data/frama-c-20200625+scandium/src/plugins/wp/tests/wp_typed/bug_9.c:8:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *T2[1]; data/frama-c-20200625+scandium/tests/builtins/alloc_weak.c:14:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst + off, src + off, len); data/frama-c-20200625+scandium/tests/builtins/fam.c:16:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(option->value, value, 2); data/frama-c-20200625+scandium/tests/builtins/imprecise.c:121:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t_char[100]; data/frama-c-20200625+scandium/tests/builtins/imprecise.c:127:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c [20480]; data/frama-c-20200625+scandium/tests/builtins/linked_list.c:13:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char MEMORY[MEMORY_SIZE]; data/frama-c-20200625+scandium/tests/builtins/malloc_bug_tr.c:13:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, "foo", 4); data/frama-c-20200625+scandium/tests/builtins/malloc_bug_tr.c:14:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p + 4, "x", 2); // must produce alarm data/frama-c-20200625+scandium/tests/builtins/malloc_bug_tr.c:15:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, p + 5, 1); // \valid_read((p + 5) + (0 .. (1 - 1))) data/frama-c-20200625+scandium/tests/builtins/memchr.c:27:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define CHAR_ARRAY(var,n) char var[n] data/frama-c-20200625+scandium/tests/builtins/memcpy.c:7:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[20]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:8:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst1[20], dst2[20], dst3[20]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:9:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst4[20], dst5[100]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:28:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p,"d",1); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:47:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tm[p],s,4); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:49:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&um[p],s,2); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:53:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ttyp[p],&ty,sizeof(typ)); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:56:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct t1 { int x; int y; int* p; char padding[24];} v1,v2, v3, v4, v5; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:68:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst1+1, src+2, b); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:70:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst2+1, src+2, 2*b); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:73:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst3+5, src+2, b); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:75:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst4+5, src+2, 2*b); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:83:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&v2, &v1, sizeof(v1)); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:85:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t+2, t, (1+!a)*sizeof(v1)); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:87:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&v3, t+(int)t, sizeof(v1)); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:89:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&v4 + (int)&v4, &v1, sizeof(v1)-20); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:91:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&v5 + (int)&v5, &v4, sizeof(v4)-20); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:96:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&x, (void const*)&x, i); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:101:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &src[0], b); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:105:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &src[0], b); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:108:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptop1[800]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:114:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pptop, src, 4); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:116:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptop2[800]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:122:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pptop, src+1, 4); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:124:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptop3[800]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:131:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pptop, src+2, 4); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:133:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptop4[800]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:140:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pptop, src+2, 5); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:143:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char garbledsize[100]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:145:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pgarbledsize, src, (unsigned int)garbledsize); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:148:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dstmaybesize1[15], dstmaybesize2[150]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:151:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dstmaybesize1, src, maybesize); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:153:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dstmaybesize2, src, maybesize); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:168:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char a[50]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:169:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[50]; data/frama-c-20200625+scandium/tests/builtins/memcpy.c:172:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, a, 10); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:174:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, a, itv(0,25)); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:179:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, a, 10); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:181:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, a, itv(0,25)); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:187:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, a, 10); // de-initialize b data/frama-c-20200625+scandium/tests/builtins/memcpy.c:190:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, a, itv(0,25)); // copy completely uninitialized in an unsure way data/frama-c-20200625+scandium/tests/builtins/memcpy.c:198:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, a, 10); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:200:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, a, itv(0,25)); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:209:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p, &q, sizeof(int *)); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:220:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (i) memcpy(0, &l, 0); data/frama-c-20200625+scandium/tests/builtins/memcpy.c:221:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (i) memcpy(&l, 0, 0); data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[512]; data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[512] = { 0 }; data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:10:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t, s, l); data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:15:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t, s, l); data/frama-c-20200625+scandium/tests/builtins/memcpy2.c:18:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t, s, l); data/frama-c-20200625+scandium/tests/builtins/memcpy_invalid.c:17:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dst, (char *)&src + i, sizeof(src) - i); data/frama-c-20200625+scandium/tests/builtins/precise_memset.c:68:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t_b[SIZE]; data/frama-c-20200625+scandium/tests/builtins/strchr.c:27:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define CHAR_ARRAY(var,n) char var[n] data/frama-c-20200625+scandium/tests/builtins/strlen.c:27:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define CHAR_ARRAY(var,n) char var[n] data/frama-c-20200625+scandium/tests/builtins/strlen.c:51:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unterminated_string[12] = "unterminated"; data/frama-c-20200625+scandium/tests/builtins/strlen.c:78:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[4]; data/frama-c-20200625+scandium/tests/builtins/strlen.c:87:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char empty_or_non_terminated[1]; data/frama-c-20200625+scandium/tests/builtins/strlen.c:92:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char non_terminated[1] = {'X'}; data/frama-c-20200625+scandium/tests/builtins/strlen.c:95:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char non_terminated2[4] = { 76, 0, 28, 14 }; data/frama-c-20200625+scandium/tests/builtins/strlen.c:219:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[4]; data/frama-c-20200625+scandium/tests/builtins/strlen.c:234:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loc_char_array[5]; data/frama-c-20200625+scandium/tests/builtins/strlen.c:274:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char maybe_init[2]; data/frama-c-20200625+scandium/tests/builtins/strlen.c:309:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/frama-c-20200625+scandium/tests/builtins/strlen.c:330:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest[100 * 2]; data/frama-c-20200625+scandium/tests/builtins/strlen_align.c:15:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stval[2]; data/frama-c-20200625+scandium/tests/builtins/strnlen.c:4:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t1[5] = "abcde"; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:19:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define CHAR_ARRAY(var,n) char var[n] data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:39:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unterminated_string[12] = "unterminated"; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:83:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char empty_or_uninitialized[1]; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:88:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uninitialized[1]; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:143:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[100]; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:170:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[100]; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:208:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loc_char_array[5]; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:248:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char maybe_init[2]; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:488:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/frama-c-20200625+scandium/tests/builtins/strnlen2.c:509:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest[100 * 2]; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:27:27: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define CHAR_ARRAY(var,n) wchar_t var[n] data/frama-c-20200625+scandium/tests/builtins/wcslen.c:51:1: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t unterminated_string[12] = L"unterminated"; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:78:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t t[4]; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:87:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t empty_or_non_terminated[1]; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:92:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t non_terminated[1] = {'X'}; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:95:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t non_terminated2[4] = { 76, 0, 28, 14 }; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:219:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t s[4]; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:234:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t loc_char_array[5]; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:274:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t maybe_init[2]; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:313:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t buf[100]; data/frama-c-20200625+scandium/tests/builtins/wcslen.c:335:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t dest[100 * 2]; data/frama-c-20200625+scandium/tests/builtins/write-const.c:18:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &x, sizeof(x)); data/frama-c-20200625+scandium/tests/cil/issues.c:41:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1]; data/frama-c-20200625+scandium/tests/cil/issues.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[(((time_t) 1.5 == 1)) ? 1 : -1]; data/frama-c-20200625+scandium/tests/cil/issues.c:85:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[mySize() * 2]; data/frama-c-20200625+scandium/tests/libc/libgen_h.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[128] = "/tmp/bla/ble.c"; data/frama-c-20200625+scandium/tests/libc/netdb_c.c:30:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUF_SIZE]; data/frama-c-20200625+scandium/tests/libc/socket.c:21:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rcv_buffer[SIZEOF_RCV_BUFFER]; data/frama-c-20200625+scandium/tests/libc/socket.c:25:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rcv_buffer_scattered1[2]; \ data/frama-c-20200625+scandium/tests/libc/socket.c:26:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rcv_buffer_scattered2[5]; \ data/frama-c-20200625+scandium/tests/libc/socket.c:27:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rcv_buffer_scattered3[3]; \ data/frama-c-20200625+scandium/tests/libc/socket.c:114:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/frama-c-20200625+scandium/tests/libc/stdio_c.c:11:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). stream = fopen("/etc/motd", "r"); data/frama-c-20200625+scandium/tests/libc/stdio_h.c:6:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen("/dev/urandom", "r"); data/frama-c-20200625+scandium/tests/libc/stdio_h.c:23:15: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). FILE *tmp = tmpfile(); data/frama-c-20200625+scandium/tests/libc/stdio_h.c:36:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fgets_buf0[1]; data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[10] = "NAME=val"; data/frama-c-20200625+scandium/tests/libc/stdlib_c_env.c:15:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "BLE=val"); data/frama-c-20200625+scandium/tests/libc/stdlib_h.c:82:11: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). int r = mkstemp(tempFilename); data/frama-c-20200625+scandium/tests/libc/string_c.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest[6], src[6] = "hello"; data/frama-c-20200625+scandium/tests/libc/string_c.c:10:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. char *p = memcpy(dest, src, 6); data/frama-c-20200625+scandium/tests/libc/string_c.c:15:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src2[5] = "a\0b\0"; data/frama-c-20200625+scandium/tests/libc/string_c.c:16:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src2, 5); data/frama-c-20200625+scandium/tests/libc/string_c.c:19:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (v) memcpy(dest, NULL, 0); data/frama-c-20200625+scandium/tests/libc/string_c.c:20:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (v) p = memcpy(NULL, NULL, 0); data/frama-c-20200625+scandium/tests/libc/string_c.c:23:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, &x, 4); data/frama-c-20200625+scandium/tests/libc/string_c.c:30:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[6] = {1, 2, 3, 4, 5, 6}; data/frama-c-20200625+scandium/tests/libc/string_c.c:91:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest[4] = {0, 0, 0, 0}; data/frama-c-20200625+scandium/tests/libc/string_c.c:102:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hello[6] = "hello"; data/frama-c-20200625+scandium/tests/libc/string_c.c:122:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[10]; data/frama-c-20200625+scandium/tests/libc/string_c.c:124:13: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. char *p = strcat(s, "hello"); data/frama-c-20200625+scandium/tests/libc/string_c.c:141:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[7]; data/frama-c-20200625+scandium/tests/libc/string_c.c:142:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. char *p = strcpy(s, "hello"); data/frama-c-20200625+scandium/tests/libc/string_c.c:145:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "654321"); data/frama-c-20200625+scandium/tests/libc/string_c.c:153:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[7]; data/frama-c-20200625+scandium/tests/libc/string_c.c:166:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hello[6] = "hello"; data/frama-c-20200625+scandium/tests/libc/string_c.c:187:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hello[6] = "hello"; data/frama-c-20200625+scandium/tests/libc/string_c.c:226:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[6] = {1, 2, 3, 1, 2, 4}; data/frama-c-20200625+scandium/tests/libc/string_c.c:243:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[6] = {1, 2, 3, 1, 2, 4}; data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[32]; data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:85:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(b, "abc"); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:90:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(b, "aaababccdd0001122223"); data/frama-c-20200625+scandium/tests/libc/string_c_strchr.c:34:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[512]; data/frama-c-20200625+scandium/tests/libc/string_c_strchr.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[128]; data/frama-c-20200625+scandium/tests/libc/string_c_strchr.c:55:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[256]; data/frama-c-20200625+scandium/tests/libc/string_h.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[10]; data/frama-c-20200625+scandium/tests/libc/string_h.c:13:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(string, "hello"); data/frama-c-20200625+scandium/tests/libc/string_h.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string2[10]; data/frama-c-20200625+scandium/tests/libc/string_h.c:30:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[100]; data/frama-c-20200625+scandium/tests/libc/string_h.c:32:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source[100]; data/frama-c-20200625+scandium/tests/libc/string_h.c:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[30]; data/frama-c-20200625+scandium/tests/libc/string_h.c:41:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[30]; data/frama-c-20200625+scandium/tests/libc/string_h.c:61:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2] = {0}; data/frama-c-20200625+scandium/tests/libc/string_h.c:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[4] = "abc"; data/frama-c-20200625+scandium/tests/libc/string_h.c:86:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2] = {0}; data/frama-c-20200625+scandium/tests/libc/string_h.c:96:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[4] = "abc"; data/frama-c-20200625+scandium/tests/libc/string_h.c:112:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[3]; data/frama-c-20200625+scandium/tests/libc/string_h.c:114:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src2[3]; data/frama-c-20200625+scandium/tests/libc/string_h.c:124:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/frama-c-20200625+scandium/tests/libc/string_h.c:125:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[32]; data/frama-c-20200625+scandium/tests/libc/string_h.c:130:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[3]; data/frama-c-20200625+scandium/tests/libc/strings_h.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[3] = "ABc"; data/frama-c-20200625+scandium/tests/libc/strings_h.c:17:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s4[10]; data/frama-c-20200625+scandium/tests/libc/sys_file_h.c:5:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open("/tmp/bla", O_APPEND); data/frama-c-20200625+scandium/tests/libc/sys_select.c:30:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fds2, &fds1, sizeof(fds1)); data/frama-c-20200625+scandium/tests/libc/sys_stat_h.c:10:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open("/tmp/bla", O_RDWR, S_IRWXU | S_IRWXG); data/frama-c-20200625+scandium/tests/libc/sys_stat_h.c:19:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char non_terminated[7] = "invalid"; data/frama-c-20200625+scandium/tests/libc/termios.c:10:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/ttyS1", O_RDWR); data/frama-c-20200625+scandium/tests/libc/time_misc.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outstr[200]; data/frama-c-20200625+scandium/tests/libc/unistd_h.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[256]; data/frama-c-20200625+scandium/tests/libc/unistd_h.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[64]; data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:25:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t buf[20]; data/frama-c-20200625+scandium/tests/libc/wchar_h.c:5:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fd = fopen("bla", "r"); data/frama-c-20200625+scandium/tests/libc/wchar_h.c:7:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t buf[30]; data/frama-c-20200625+scandium/tests/libc/wchar_h.c:11:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t buf2[2]; data/frama-c-20200625+scandium/tests/libc/wchar_h.c:32:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t wdst[10]; data/frama-c-20200625+scandium/tests/libc/wchar_h.c:58:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t wdst2[20] = {0}; data/frama-c-20200625+scandium/tests/pdg/decl_dpds.c:15:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int main (int argc, char *argv[4]) { data/frama-c-20200625+scandium/tests/rte_manual/sizeof.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[n + 3]; // variable length array data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:20:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char heap[N]; data/frama-c-20200625+scandium/tests/spec/footprint.c:21:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[10]; data/frama-c-20200625+scandium/tests/spec/range.c:1:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct foo { char bar[4]; }; data/frama-c-20200625+scandium/tests/spec/range.c:6:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char baz[4]; data/frama-c-20200625+scandium/tests/spec/tsets.c:1:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct foo { char bar[4]; }; data/frama-c-20200625+scandium/tests/spec/tsets.c:6:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char baz[4]; data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[1]; data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:145:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[64]; data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:146:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char a_init[64] = {0x85,0x50,0x43,0xda, 0x06,0x99,0xd8,0x3b, data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:154:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char a[64]; data/frama-c-20200625+scandium/tests/syntax/gnu-asm-aesni.c:158:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(a, a_init, 64 * sizeof(unsigned char)); data/frama-c-20200625+scandium/tests/syntax/macro_escape_chars.c:5:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). extern FILE* fopen(const char*,const char*); data/frama-c-20200625+scandium/tests/syntax/macro_escape_chars.c:24:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen("/tmp/testfile.out","w"); data/frama-c-20200625+scandium/tests/syntax/vla_strlen.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[strlen(s) + 1]; data/frama-c-20200625+scandium/tests/value/addrofstring.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char (*p)[4] = &("bar"); data/frama-c-20200625+scandium/tests/value/align_char_array.c:11:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct s { char c; char a[2]; }; data/frama-c-20200625+scandium/tests/value/align_char_array.c:15:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[10][10]={0,0,1,1,1,1,1}; data/frama-c-20200625+scandium/tests/value/array_array.c:9:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char StaticAllocHEAP[10000]={2,2,2,2}; data/frama-c-20200625+scandium/tests/value/attribute-aligned.c:83:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tb[0] __attribute__((__aligned__(SIZE))); data/frama-c-20200625+scandium/tests/value/behaviors2.c:175:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[MAX_ERRMSG_LEN]; data/frama-c-20200625+scandium/tests/value/behaviors2.c:325:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[MAX_ERRMSG_LEN]; data/frama-c-20200625+scandium/tests/value/empty_base.c:92:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&e2, &e1, sizeof(e1)); data/frama-c-20200625+scandium/tests/value/empty_base.c:97:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&c2, &c1, sizeof(c1)); data/frama-c-20200625+scandium/tests/value/empty_struct2.c:48:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&e2, &e1, sizeof(e1)); // imprecise, no builtin data/frama-c-20200625+scandium/tests/value/empty_struct2.c:53:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&c2, &c1, sizeof(c1)); // imprecise, no builtin data/frama-c-20200625+scandium/tests/value/empty_union.c:72:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&e2, &e1, sizeof(e1)); // imprecise, no builtin data/frama-c-20200625+scandium/tests/value/empty_union.c:77:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&c2, &c1, sizeof(c1)); // imprecise, no builtin data/frama-c-20200625+scandium/tests/value/initialized.c:152:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key[128]; data/frama-c-20200625+scandium/tests/value/initialized.c:185:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[10]; data/frama-c-20200625+scandium/tests/value/logic.c:165:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char T[1] = {2}; data/frama-c-20200625+scandium/tests/value/packed.c:3:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. volatile char Reserved[4]; data/frama-c-20200625+scandium/tests/value/packed.c:9:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. volatile char Reserved[4]; data/frama-c-20200625+scandium/tests/value/recol.c:12:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[S]; data/frama-c-20200625+scandium/tests/value/subset.c:12:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fopen(const char * restrict filename, data/frama-c-20200625+scandium/tests/value/subset.c:32:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* p = fopen ("bla", 0); data/frama-c-20200625+scandium/tests/value/threat_redundant.c:14:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[10]={'a','b','a','b','a','b','a','b','a','b'}; data/frama-c-20200625+scandium/tests/value/volatile.c:31:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. volatile char t[12]; data/frama-c-20200625+scandium/tests/value/wide_string.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char (*p)[4] = &("bar"); data/frama-c-20200625+scandium/tests/value/wide_string.c:7:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t (*q)[4] = &(L"foO"); data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:68:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:68:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:130:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy(void *dest, const void *src, size_t n) data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:135:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[i] = ((char *)src)[i]; data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:135:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[i] = ((char *)src)[i]; data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:392:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(answer,"ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ\ data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:30:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy(void *dest, const void *src, size_t n); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_bad.c:16:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, leader, leader_len); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_bad.c:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rsn_leader [LEADERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_ok.c:16:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, leader, leader_len); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/interproc_ok.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rsn_leader [LEADERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_bad.c:16:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, leader, leader_len); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_bad.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char leader [LEADERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_ok.c:16:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, leader, leader_len); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/encode_ie/no_sprintf_ok.c:49:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char leader [LEADERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/giwscan_cb/giwscan_cb_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[IESZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/MADWiFi/CVE-2006-6332/giwscan_cb/giwscan_cb_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[IESZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_bad.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[MAXNAMLEN + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_bad.c:26:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_ok.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[MAXNAMLEN + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_int_ok.c:26:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_bad.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[MAXNAMLEN + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_bad.c:26:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_ok.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[MAXNAMLEN + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/NetBSD-libc/CVE-2006-6652/glob3/glob3_ptr_ok.c:26:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2 [LINE_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c:61:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2 [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c:78:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_bad.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2 [LINE_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_bad.c:23:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_ok.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2 [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_ok.c:23:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_bad.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2 [LINE_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_bad.c:22:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_ok.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2 [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_ok.c:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_bad.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2 [LINE_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_bad.c:22:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_ok.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2 [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_ok.c:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_bad.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_bad.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_ok.c:55:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_ok.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_bad.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_bad.c:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_ok.c:49:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_ok.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_bad.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_bad.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_ok.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_ok.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_bad.c:41:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_bad.c:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_ok.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_ok.c:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_bad.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_bad.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_ok.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_ok.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_bad.c:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_bad.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_ok.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_ok.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_bad.c:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_bad.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_ok.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_ok.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_bad.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_bad.c:55:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_ok.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_ok.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_bad.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_bad.c:49:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_ok.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_ok.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_bad.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_bad.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_ok.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_ok.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_bad.c:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_bad.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_ok.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_ok.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_bad.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_bad.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_ok.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_ok.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_bad.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_bad.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_ok.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_ok.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_bad.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_bad.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_ok.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_ok.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_bad.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_bad.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_ok.c:61:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_ok.c:60:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_bad.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_bad.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_ok.c:55:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_ok.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_bad.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_bad.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_ok.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_ok.c:56:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_bad.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_bad.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_ok.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_ok.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_bad.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_bad.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_ok.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_ok.c:56:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_bad.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_bad.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_ok.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_ok.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_bad.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_bad.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_ok.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[EXPRESSION_LENGTH]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_ok.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char A [LINE_LENGTH+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/fetchsms2.c:20:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[16]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/fetchsms2.c:21:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]= "F+CMGR:"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/fetchsms2.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [PDUSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_bad.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE] = "ABCDE+C"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_bad.c:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [PDUSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_ok.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/full_ok.c:61:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_bad.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_bad.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [PDUSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_ok.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr2_loops_ok.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_bad.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_bad.c:28:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [PDUSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_bad.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_bad.c:43:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [PDUSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_ok.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_loops_ok.c:43:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_ok.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/istrstr_ok.c:28:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_bad.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_bad.c:43:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [PDUSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_ok.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6876/fetchsms/loops_ok.c:43:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pdu [ANSWERSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_bad.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BUFSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_bad.c:36:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg [INSZ] = "message"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_ok.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BUFSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/SpamAssassin/BID-6679/message_write/loop_ok.c:36:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg [INSZ] = "message"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_arr_bad.c:92:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_arr_ok.c:99:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_ptr_bad.c:92:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixLong_ptr_ok.c:99:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_arr_bad.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_arr_ok.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_ptr_bad.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter1_prefixShort_ptr_ok.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixLong_arr_bad.c:97:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixLong_ptr_bad.c:97:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixShort_arr_bad.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2004-0940/get_tag/iter2_prefixShort_ptr_bad.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[MAX_STRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_bad.c:49:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ok.c:49:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_bad.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_ok.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_bad.c:29:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp1_ok.c:29:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_bad.c:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_ok.c:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_bad.c:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_ok.c:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_bad.c:32:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[TOKEN_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/strncmp_ok.c:32:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri [URI_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_bad.c:38:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, cp, SPACE_FOR_VARS); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_ok.c:38:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, cp, SPACE_FOR_VARS); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_bad.c:35:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, cp, SPACE_FOR_VARS); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_ok.c:35:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, cp, SPACE_FOR_VARS); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/simp_bad.c:35:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, cp, SPACE_FOR_VARS); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/simp_ok.c:35:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, cp, SPACE_FOR_VARS); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/vars_bad.c:38:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, cp, SPACE_FOR_VARS); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/vars_ok.c:38:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp1, cp, SPACE_FOR_VARS); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/bind.h:31:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _n_name[sizeof(void*)]; /* Counted str, malloc'ed. */ data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char queryname[INSZ+1], dname[INSZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:222:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysloginfo [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:223:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char syslogdname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char queryname[INSZ+1], dname[INSZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:222:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysloginfo [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:223:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char syslogdname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:64:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char queryname[INSZ+1], dname[INSZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:75:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:93:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysloginfo [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:94:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char net_queryname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:95:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char net_dname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:64:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char queryname[INSZ+1], dname[INSZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:75:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:93:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysloginfo [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:94:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char net_queryname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:95:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char net_dname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:26:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char queryname[INSZ+1], dname[INSZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:38:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:56:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysloginfo [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char net_queryname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char net_dname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:26:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char queryname[INSZ+1], dname[INSZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:38:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:56:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysloginfo [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char net_queryname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char net_dname [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_bad.c:19:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user[USERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_bad.c:27:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_ok.c:18:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user[USERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/no_strcmp_ok.c:26:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_bad.c:22:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user[USERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_bad.c:30:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_ok.c:21:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user[USERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strchr_ok.c:29:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_bad.c:19:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user[USERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_bad.c:27:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_ok.c:18:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char user[USERSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/edbrowse/CVE-2006-6909/ftpls/strcmp_ok.c:26:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/constants.h:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sun_path[SUN_PATH_SZ]; /* Path name. */ data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/main/simp_bad.c:6:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename [FILENAME_SZ] = "test"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/gxine/CVE-2007-0406/main/simp_ok.c:6:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename [FILENAME_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_bad.c:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entity_name_buf[ENTITY_NAME_LENGTH_MAX+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_bad.c:211:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_ok.c:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entity_name_buf[ENTITY_NAME_LENGTH_MAX+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_full_ok.c:208:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_no_entities_bad.c:111:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_no_entities_ok.c:108:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_simp_bad.c:89:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_simp_ok.c:86:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_some_entities_bad.c:159:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/libgd/CVE-2007-0455/gdImageStringFTEx/gd_some_entities_ok.c:156:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_bad.c:3:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_ok.c:3:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char winsreq [FSTRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_bad.c:16:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char winsreq [FSTRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_ok.c:16:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in [INSZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/constants.h:7:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char fstring[FSTRING_LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:88:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). temp = fopen(argv[1],"r"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:101:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char index_64[128] = data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char canary[10]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:150:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(canary, "GOOD"); /* use canary to see if fbuf gets overflowed */ data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2.h:151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *e_macro[256]; /* macro definitions */ data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_heavy_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_heavy_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_med_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_med_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_no_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_one_char_no_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_heavy_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_heavy_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_med_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_med_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_no_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_three_chars_no_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_heavy_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_heavy_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_med_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_med_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_no_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_arr_two_chars_no_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_heavy_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_heavy_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_med_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_med_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_no_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_one_char_no_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_heavy_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_heavy_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_med_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_med_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_no_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_three_chars_no_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_heavy_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_heavy_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_med_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_med_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_no_test_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/mime7to8/mime7to8_ptr_two_chars_no_test_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[MAXLINE+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_arr_bad.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfile[BASE_SZ]; // originally MAXLINE data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_arr_ok.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfile[BASE_SZ]; // originally MAXLINE data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_ptr_bad.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfile[BASE_SZ]; // originally MAXLINE data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0206/mime_fromqp/mime_fromqp_ptr_ok.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfile[BASE_SZ]; // originally MAXLINE data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/complete/my-main.c:76:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tTdvect[LEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_one_loop_bad.c:3:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in[11]; // = "3277192070"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_one_loop_ok.c:3:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char in[11]; // = "3277192070"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_bad.c:7:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[INSIZE+1]; // = "3277192070-100"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_bad.c:8:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[BASE_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_ok.c:7:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[INSIZE+1]; // = "3277192070-100"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2001-0653/tTflag/tTflag_arr_two_loops_ok.c:8:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[BASE_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_bad.c:8:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[sizeof (u_int16_t) + sizeof (u_char) + DATA]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_ok.c:6:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[sizeof (u_int16_t) + sizeof (u_char) + BASE_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/txt-dns.h:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mx_r_domain[1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/txt-dns.h:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srv_r_target[1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_bad.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BASE_SZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_bad.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[BASE_SZ+70]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_ok.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BASE_SZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_no_test_ok.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[BASE_SZ+70]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_bad.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BASE_SZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_bad.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[BASE_SZ+70]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_ok.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BASE_SZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_one_test_ok.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[BASE_SZ+70]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_bad.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BASE_SZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_bad.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[BASE_SZ+70]; // = "<"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_ok.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BASE_SZ+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/close_angle/close-angle_ptr_two_tests_ok.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[BASE_SZ+70]; // = "<"; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:154:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char canary[MAXCANARY+1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:155:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAXNAME + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:156:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char test_buf[10]; /* will use as a canary to detect overflow */ data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:160:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(test_buf, "GOOD"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:520:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[100]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_bad.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[ADDRSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_bad.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pvpbuf[PSBUFSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_ok.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[ADDRSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_med_test_ok.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pvpbuf[PSBUFSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_bad.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[ADDRSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_bad.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pvpbuf[PSBUFSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_ok.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[ADDRSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0161/prescan/prescan_arr_min_test_ok.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pvpbuf[PSBUFSIZE]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char login[LOGIN + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gecos[GECOS + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_bad.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUF + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char login[LOGIN + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gecos[GECOS + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c:16:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUF + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char login[LOGIN + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gecos[GECOS + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_bad.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUF + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char login[LOGIN + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gecos[GECOS + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUF + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:27:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [PATHNAME_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:28:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_bad.c:29:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:27:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [PATHNAME_SZ]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:28:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-curpath/simple_ok.c:29:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:103:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:105:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:109:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:110:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:111:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:83:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:84:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:85:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:89:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:90:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:91:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:41:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_bad.c:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:86:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:87:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:88:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:86:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:87:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:88:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:67:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:68:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:69:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:67:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:68:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:30:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:31:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_bad.c:32:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:6:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAXPATHLEN], data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:30:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:31:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:32:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chroot_path [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:55:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:55:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:69:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:70:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:69:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:70:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, *q, wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:37:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, *q, wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:37:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:99:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:100:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:99:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname [MAXPATHLEN]; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:100:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved [MAXPATHLEN]; data/frama-c-20200625+scandium/share/libc/netdb.c:123:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(__fc_ghbn.hostbuf, name, __FC_HOSTBUF_SIZE - 1); data/frama-c-20200625+scandium/share/libc/netdb.c:147:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(__fc_ghbn.hostbuf, name, __FC_HOSTBUF_SIZE - 1); data/frama-c-20200625+scandium/share/libc/stdio.c:62:16: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). char c = fgetc(stream); data/frama-c-20200625+scandium/share/libc/stdio.h:263:12: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). extern int fgetc(FILE *stream); data/frama-c-20200625+scandium/share/libc/stdio.h:299:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). extern int getc(FILE *stream); data/frama-c-20200625+scandium/share/libc/stdio.h:304:12: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). extern int getchar(void); data/frama-c-20200625+scandium/share/libc/stdlib.c:141:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t namelen = strlen(name); data/frama-c-20200625+scandium/share/libc/stdlib.c:171:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t namelen = strlen(name); data/frama-c-20200625+scandium/share/libc/string.c:104:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen(const char *s) data/frama-c-20200625+scandium/share/libc/string.c:182:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen(dest); data/frama-c-20200625+scandium/share/libc/string.c:191:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. char* strncat(char *dest, const char *src, size_t n) data/frama-c-20200625+scandium/share/libc/string.c:193:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t dest_len = strlen(dest); data/frama-c-20200625+scandium/share/libc/string.c:213:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy(char *dest, const char *src, size_t n) data/frama-c-20200625+scandium/share/libc/string.c:237:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (size_t i = strlen(s)+1; i > 0; i--) data/frama-c-20200625+scandium/share/libc/string.c:292:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(s) + 1; data/frama-c-20200625+scandium/share/libc/string.h:129:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extern size_t strlen (const char *s); data/frama-c-20200625+scandium/share/libc/string.h:378:14: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). extern char *strncpy(char *restrict dest, data/frama-c-20200625+scandium/share/libc/string.h:444:14: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. extern char *strncat(char *restrict dest, const char *restrict src, size_t n); data/frama-c-20200625+scandium/share/libc/sys/stat.h:97:15: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). extern mode_t umask(mode_t cmask); data/frama-c-20200625+scandium/share/libc/unistd.h:1012:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). extern ssize_t read(int fd, void *buf, size_t count); data/frama-c-20200625+scandium/share/libc/unistd.h:1127:21: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. extern int usleep(useconds_t usec); data/frama-c-20200625+scandium/share/libc/wchar.c:52:8: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t wcslen(const wchar_t * str) data/frama-c-20200625+scandium/share/libc/wchar.c:59:11: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). wchar_t * wcsncpy(wchar_t *dest, const wchar_t *src, size_t n) data/frama-c-20200625+scandium/share/libc/wchar.c:74:14: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = wcslen(dest); data/frama-c-20200625+scandium/share/libc/wchar.c:82:10: [1] (buffer) wcsncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings. wchar_t* wcsncat(wchar_t *dest, const wchar_t *src, size_t n) data/frama-c-20200625+scandium/share/libc/wchar.c:84:21: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t dest_len = wcslen(dest); data/frama-c-20200625+scandium/share/libc/wchar.h:178:15: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extern size_t wcslen(const wchar_t *s); data/frama-c-20200625+scandium/share/libc/wchar.h:189:18: [1] (buffer) wcsncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings. extern wchar_t * wcsncat(wchar_t *restrict dest, const wchar_t *restrict src, size_t n); data/frama-c-20200625+scandium/share/libc/wchar.h:207:18: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). extern wchar_t * wcsncpy(wchar_t *restrict dest, const wchar_t *restrict src, size_t n); data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:868:32: [1] (free) memalign: On some systems (though not Linux-based systems) an attempt to free() results from memalign() may fail. This may, on a few systems, be exploitable. Also note that memalign() may not check that the boundary parameter is correct (CWE-676). Use posix_memalign instead (defined in POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD 4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases, malloc()'s alignment may be sufficient. #define dlmemalign memalign data/frama-c-20200625+scandium/src/plugins/e-acsl/contrib/libdlmalloc/dlmalloc.c:3236:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fd, buf, sizeof(buf)) == sizeof(buf)) { data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree_mmodel.c:585:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t arglen = strlen(*argv) + 1; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/bittree_model/e_acsl_bittree_mmodel.c:600:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t envlen = strlen(*environ) + 1; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_assert.h:82:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char buf [strlen(fmt) + strlen(afmt) + PATH_MAX + 11]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_assert.h:82:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char buf [strlen(fmt) + strlen(afmt) + PATH_MAX + 11]; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_debug.h:97:5: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int getchar(void); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_debug.h:102:3: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). getchar(); \ data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:250:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(i = 0; i < strlen(specifier_chars); i++) data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:252:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(i = 0; i < strlen(length_chars); i++) data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:254:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(i = 0; i < strlen(flag_chars); i++) data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:256:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(i = 0; i < strlen(period_chars); i++) data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:570:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dir->directive, fmt_start, len); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_format.h:827:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int arglen = strlen(fmtdesc); /* number of variadic arguments */ data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:216:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). return strncpy(dest, src, n); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_libc_replacements.h:265:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. return strncat(dest, src, n); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_shexec.h:89:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((fetched = read(fd, buffer + size - buffer_size, buffer_size))) { data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_shexec.h:160:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write(infd[1], data->stdins, strlen(data->stdins)) == -1) data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:47:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. # define strncat __builtin_strncat data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:49:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define strlen __builtin_strlen data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:53:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). # define strncpy __builtin_strncpy data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:64:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(dest + strlen(dest), src, strlen(src) + 1); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:64:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(dest + strlen(dest), src, strlen(src) + 1); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:71:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(s) + 1; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:90:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t ldelim = delim ? strlen(delim) : 0; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:91:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(src) + strlen(dest) + 1; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:91:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(src) + strlen(dest) + 1; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:108:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t slen = strlen(str); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_string.h:109:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t plen = strlen(pat); data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_trace.h:93:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). outs[strlen(outs)-1] = '\0'; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/e_acsl_trace.h:94:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(outs) && endswith(outs, "??:0") && endswith(outs, "??:?")) { data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_mmodel.c:152:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t arglen = strlen(*argv) + 1; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_segment_mmodel.c:181:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t envlen = strlen(*environ) + 1; data/frama-c-20200625+scandium/src/plugins/e-acsl/share/e-acsl/segment_model/e_acsl_shadow_layout.h:176:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uintptr_t addr = (uintptr_t)*env + strlen(*env); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/bts2252.c:22:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (&destbuf[loc], &srcbuf[loc], 1); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2252.c:5:34: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). extern int ( /* missing proto */ strncpy)(char *x_0, char *x_1, int x_2); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/bts/oracle_ci/gen_bts2252.c:50:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(destbuf + loc,srcbuf + loc,1); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:50:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(fmt); data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/format/printf.c:54:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int i = 0; i < strlen(valid_specifiers); i++) { data/frama-c-20200625+scandium/src/plugins/e-acsl/tests/memory/mainargs.c:18:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(argv[i]); data/frama-c-20200625+scandium/tests/builtins/strlen.c:53:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define STRLEN(s, offs) strlen(s+offs) data/frama-c-20200625+scandium/tests/builtins/strlen.c:60:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z1 = strlen(p); data/frama-c-20200625+scandium/tests/builtins/strlen.c:65:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z2 = strlen(p); data/frama-c-20200625+scandium/tests/builtins/strlen.c:70:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z3 = strlen(p); data/frama-c-20200625+scandium/tests/builtins/strlen.c:75:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z4 = strlen(p); data/frama-c-20200625+scandium/tests/builtins/strlen.c:81:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z5 = strlen(t); // warning data/frama-c-20200625+scandium/tests/builtins/strlen.c:89:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z1 = strlen(empty_or_non_terminated); data/frama-c-20200625+scandium/tests/builtins/strlen.c:93:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(strlen(non_terminated), non_terminated); data/frama-c-20200625+scandium/tests/builtins/strlen.c:97:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(strlen(p), p); data/frama-c-20200625+scandium/tests/builtins/strlen.c:140:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(strlen(p), p); data/frama-c-20200625+scandium/tests/builtins/strlen.c:155:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z1 = strlen(p); data/frama-c-20200625+scandium/tests/builtins/strlen.c:225:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z1 = strlen(s); // alarm data/frama-c-20200625+scandium/tests/builtins/strlen.c:228:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z2 = strlen(s); // no alarm data/frama-c-20200625+scandium/tests/builtins/strlen.c:241:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(strlen(unterminated_string), unterminated_string); data/frama-c-20200625+scandium/tests/builtins/strlen.c:244:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz1 = strlen(str); data/frama-c-20200625+scandium/tests/builtins/strlen.c:248:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz2 = strlen(str); data/frama-c-20200625+scandium/tests/builtins/strlen.c:252:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz3 = strlen(str); data/frama-c-20200625+scandium/tests/builtins/strlen.c:255:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(strlen(loc_char_array), loc_char_array); data/frama-c-20200625+scandium/tests/builtins/strlen.c:256:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz4 = strlen(zero_str); data/frama-c-20200625+scandium/tests/builtins/strlen.c:260:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz5 = strlen(s2); data/frama-c-20200625+scandium/tests/builtins/strlen.c:265:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz6 = strlen(s2); data/frama-c-20200625+scandium/tests/builtins/strlen.c:270:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz7 = strlen(s1 + j); data/frama-c-20200625+scandium/tests/builtins/strlen.c:277:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz8 = strlen(maybe_init); data/frama-c-20200625+scandium/tests/builtins/strlen.c:297:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_u = strlen((char const *)u); // below plevel; precise data/frama-c-20200625+scandium/tests/builtins/strlen.c:298:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_r = strlen((char const *)r); // above plevel; imprecise data/frama-c-20200625+scandium/tests/builtins/strlen.c:299:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_t = strlen((char const *)t); // *far* above plevel data/frama-c-20200625+scandium/tests/builtins/strlen.c:302:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_u = strlen((char const *)(u+nondet)); // should be precise data/frama-c-20200625+scandium/tests/builtins/strlen.c:303:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_r = strlen((char const *)(r+nondet)); data/frama-c-20200625+scandium/tests/builtins/strlen.c:304:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_t = strlen((char const *)(t+nondet)); data/frama-c-20200625+scandium/tests/builtins/strlen.c:315:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len1 = strlen(buf + offset1); data/frama-c-20200625+scandium/tests/builtins/strlen.c:319:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len2 = strlen(buf + offset2); data/frama-c-20200625+scandium/tests/builtins/strlen.c:322:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len3 = strlen(buf + offset3); data/frama-c-20200625+scandium/tests/builtins/strlen.c:324:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len4 = strlen(buf + offset4); data/frama-c-20200625+scandium/tests/builtins/strlen.c:326:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len5 = strlen(buf + offset5); data/frama-c-20200625+scandium/tests/builtins/strlen.c:329:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len6 = strlen(p); data/frama-c-20200625+scandium/tests/builtins/strlen_align.c:24:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t z = strlen(p); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:53:25: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define WCSLEN(s, offs) wcslen(s+offs) data/frama-c-20200625+scandium/tests/builtins/wcslen.c:60:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z1 = wcslen(p); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:65:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z2 = wcslen(p); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:70:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z3 = wcslen(p); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:75:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z4 = wcslen(p); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:81:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z5 = wcslen(t); // warning data/frama-c-20200625+scandium/tests/builtins/wcslen.c:89:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z1 = wcslen(empty_or_non_terminated); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:93:17: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(wcslen(non_terminated), non_terminated); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:97:17: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(wcslen(p), p); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:140:17: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(wcslen(p), p); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:155:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z1 = wcslen(p); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:225:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z1 = wcslen(s); // alarm data/frama-c-20200625+scandium/tests/builtins/wcslen.c:228:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int z2 = wcslen(s); // no alarm data/frama-c-20200625+scandium/tests/builtins/wcslen.c:241:17: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(wcslen(unterminated_string), unterminated_string); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:244:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz1 = wcslen(str); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:248:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz2 = wcslen(str); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:252:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz3 = wcslen(str); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:255:17: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_bottom(wcslen(loc_char_array), loc_char_array); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:256:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz4 = wcslen(zero_str); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:260:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz5 = wcslen(s2); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:265:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz6 = wcslen(s2); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:270:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz7 = wcslen(s1 + j); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:277:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz8 = wcslen(maybe_init); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:301:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_u = wcslen((wchar_t const *)u); // below plevel; precise data/frama-c-20200625+scandium/tests/builtins/wcslen.c:302:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_r = wcslen((wchar_t const *)r); // above plevel; imprecise data/frama-c-20200625+scandium/tests/builtins/wcslen.c:303:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_t = wcslen((wchar_t const *)t); // *far* above plevel data/frama-c-20200625+scandium/tests/builtins/wcslen.c:306:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_u = wcslen((wchar_t const *)(u+nondet)); // should be precise data/frama-c-20200625+scandium/tests/builtins/wcslen.c:307:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_r = wcslen((wchar_t const *)(r+nondet)); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:308:11: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_t = wcslen((wchar_t const *)(t+nondet)); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:319:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len1 = wcslen(buf + offset1); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:323:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len2 = wcslen(buf + offset2); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:326:10: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len3 = wcslen(buf + offset3); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:328:10: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len4 = wcslen(buf + offset4); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:330:10: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len5 = wcslen(buf + offset5); data/frama-c-20200625+scandium/tests/builtins/wcslen.c:333:10: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len6 = wcslen(p); data/frama-c-20200625+scandium/tests/libc/coverage.c:9:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(s); data/frama-c-20200625+scandium/tests/libc/socket.c:61:3: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read( rcv_socket, rcv_buffer, SIZEOF_RCV_BUFFER); data/frama-c-20200625+scandium/tests/libc/socket.c:115:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int r = read(client_fd, buf, 64); data/frama-c-20200625+scandium/tests/libc/stdio_c.c:10:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t read; data/frama-c-20200625+scandium/tests/libc/stdio_c.c:15:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total_len += strlen(line); data/frama-c-20200625+scandium/tests/libc/string_c.c:64:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = strlen(s); data/frama-c-20200625+scandium/tests/libc/string_c.c:66:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen("ab\0c"); data/frama-c-20200625+scandium/tests/libc/string_c.c:68:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(""); data/frama-c-20200625+scandium/tests/libc/string_c.c:134:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s, ""); data/frama-c-20200625+scandium/tests/libc/string_c.c:135:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s, "x"); data/frama-c-20200625+scandium/tests/libc/string_c.c:147:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, ""); data/frama-c-20200625+scandium/tests/libc/string_c.c:154:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. char *p = strncpy(s, "hello", 7); data/frama-c-20200625+scandium/tests/libc/string_c.c:157:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(s, "bye", 3); data/frama-c-20200625+scandium/tests/libc/string_c.c:159:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(s, "die", 0); data/frama-c-20200625+scandium/tests/libc/string_c.c:161:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(s, "ab\0c", 5); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:73:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. TEST(s, strncpy(b, "abc", sizeof b - 1), b, "wrong return %p != %p"); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:78:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(b, "abc", 3); data/frama-c-20200625+scandium/tests/libc/string_c_generic.c:86:11: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. TEST(s, strncat(b, "123456", 3), b, "%p != %p"); data/frama-c-20200625+scandium/tests/libc/string_h.c:36:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(data, source, 100); data/frama-c-20200625+scandium/tests/libc/string_h.c:113:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dst,src,3); data/frama-c-20200625+scandium/tests/libc/string_h.c:118:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dst,src2,3); data/frama-c-20200625+scandium/tests/libc/sys_stat_h.c:22:21: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). mode_t old_mask = umask(0644); data/frama-c-20200625+scandium/tests/libc/unistd_h.c:12:11: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. int r = usleep(123); data/frama-c-20200625+scandium/tests/libc/unistd_h.c:13:7: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. r = usleep(456); data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:42:21: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (nondet) { r = wcslen(sc1); goto exit; } data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:44:23: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if (nondet) { res = wcsncpy(buf, sc2, n); goto exit; } data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:54:23: [1] (buffer) wcsncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings. if (nondet) { res = wcsncat(buf, sc2, n); goto exit; } data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:57:21: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (nondet) { r = wcslen((wchar_t*)""); goto exit; } data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:58:21: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (nondet) { r = wcslen((wchar_t*)"A"); goto exit; } data/frama-c-20200625+scandium/tests/libc/wchar_c_h.c:59:21: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (nondet) { r = wcslen((wchar_t*)"ABCD"); goto exit; } data/frama-c-20200625+scandium/tests/libc/wchar_h.c:33:7: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). r = wcsncpy(wdst, wsrc, 10); // no warning data/frama-c-20200625+scandium/tests/libc/wchar_h.c:37:9: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). r = wcsncpy(wdst, wsrc, wcslen(wsrc)+1); // error: not enough room data/frama-c-20200625+scandium/tests/libc/wchar_h.c:37:29: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = wcsncpy(wdst, wsrc, wcslen(wsrc)+1); // error: not enough room data/frama-c-20200625+scandium/tests/libc/wchar_h.c:41:5: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). wcsncpy(wdst, wdst, 10); // error: no separation data/frama-c-20200625+scandium/tests/libc/wchar_h.c:45:5: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). wcsncpy(0, wsrc, 10); // error: invalid dest data/frama-c-20200625+scandium/tests/libc/wchar_h.c:49:5: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). wcsncpy(wdst, 0, 10); // error: invalid src data/frama-c-20200625+scandium/tests/libc/wchar_h.c:53:5: [1] (buffer) wcsncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). wcsncpy(wsrc, wdst, 10); // error: non-writable dest data/frama-c-20200625+scandium/tests/libc/wchar_h.c:59:3: [1] (buffer) wcsncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings. wcsncat(wdst2, wsrc, 11); // no warning data/frama-c-20200625+scandium/tests/libc/wchar_h.c:60:3: [1] (buffer) wcsncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings. wcsncat(wdst2, wsrc, 10); // no warning (if wdst2 is precise) data/frama-c-20200625+scandium/tests/libc/wchar_h.c:66:5: [1] (buffer) wcsncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings. wcsncat(wdst2+10, wdst2, 10); // error: no separation data/frama-c-20200625+scandium/tests/metrics/libc.c:17:10: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return getchar(); data/frama-c-20200625+scandium/tests/misc/pragma-pack.c:348:3: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). getchar(); data/frama-c-20200625+scandium/tests/pdg/top_pdg_input.c:27:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int strlen(char* p ) { data/frama-c-20200625+scandium/tests/pdg/top_pdg_input.c:40:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen (nondet ? p_str[i] : p_str[0]); data/frama-c-20200625+scandium/tests/rte/value_rte.c:12:11: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). tmp = getchar() ; data/frama-c-20200625+scandium/tests/spec/acsl_by_example.c:28:5: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. int equal(const int* a, int n, const int* b) data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:35:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int strlen(char *s) { data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:93:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(src); data/frama-c-20200625+scandium/tests/spec/alloc_string_marshall.c:110:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *msg = alloc(2 + sizeof(int) + strlen(s->text) + 1); data/frama-c-20200625+scandium/tests/syntax/multiple_decls_contracts.c:14:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). register char *copy = malloc(strlen(str) + 1); data/frama-c-20200625+scandium/tests/syntax/vla_strlen.c:4:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char t[strlen(s) + 1]; data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:166:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy (char *dest, const char *src, size_t n) data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:232:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned strlen(char *s) data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.c:268:5: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int getc () data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:22:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy (char *dest, const char *src, size_t n); data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:25:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned strlen(const char *s); data/frama-c-20200625+scandium/tests/verisec/suite/lib/stubs.h:35:5: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int getc (/* ignore FILE* arg */); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_bad.c:62:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str, except-str); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/complete/parse_config_ok.c:65:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str, except-str); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_bad.c:12:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (str2, str, ind); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_random_index_ok.c:12:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (str2, str, ind); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_bad.c:10:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (str2, str, (unsigned int)(except-str)); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strchr_ok.c:9:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (str2, str, (unsigned int)(except-str)); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_bad.c:10:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (str2, str, (unsigned int)(except-str)); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression/guard_strstr_ok.c:9:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (str2, str, (unsigned int)(except-str)); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_bad.c:35:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullBoth_arr_inlined_ok.c:38:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_bad.c:29:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullEnd_arr_inlined_ok.c:32:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_bad.c:31:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripFullStart_arr_inlined_ok.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_bad.c:25:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripNone_arr_inlined_ok.c:28:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_bad.c:31:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesBoth_arr_inlined_ok.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_bad.c:28:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesEnd_arr_inlined_ok.c:31:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_bad.c:28:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases1_stripSpacesStart_arr_inlined_ok.c:31:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_bad.c:38:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullBoth_arr_inlined_ok.c:41:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_bad.c:32:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullEnd_arr_inlined_ok.c:35:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_bad.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripFullStart_arr_inlined_ok.c:37:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_bad.c:28:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripNone_arr_inlined_ok.c:31:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_bad.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesBoth_arr_inlined_ok.c:37:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_bad.c:31:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesEnd_arr_inlined_ok.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_bad.c:31:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases2_stripSpacesStart_arr_inlined_ok.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_bad.c:41:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullBoth_arr_inlined_ok.c:44:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_bad.c:35:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullEnd_arr_inlined_ok.c:38:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_bad.c:37:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripFullStart_arr_inlined_ok.c:40:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_bad.c:31:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripNone_arr_inlined_ok.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_bad.c:37:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesBoth_arr_inlined_ok.c:40:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_bad.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesEnd_arr_inlined_ok.c:37:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_bad.c:34:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/OpenSER/CVE-2006-6749/parse_expression_list/cases3_stripSpacesStart_arr_inlined_ok.c:37:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str2, str+start, j-start+1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_bad.c:10:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(uri) < scheme) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ok.c:10:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(uri) < scheme) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_bad.c:10:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(uri) < scheme) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/full_ptr_ok.c:10:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(uri) < scheme) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_bad.c:10:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(uri) < scheme) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp2_ok.c:10:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(uri) < scheme) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_bad.c:10:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(uri) < scheme) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/apache/CVE-2006-3747/escape_absolute_uri/simp3_ok.c:10:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(uri) < scheme) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/bind.c:11:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(comp_dn); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/expands_vars_bad.c:57:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp1 = data + strlen((char *)data) + 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/expands_vars_ok.c:59:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n1 = strlen((char *)data) + 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/simp_bad.c:30:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp1 = data + strlen((char *)data) + 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/simp_ok.c:34:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n1 = strlen((char *)data) + 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/two_expands_bad.c:38:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp1 = data + strlen((char *)data) + 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-nxt/two_expands_ok.c:40:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n1 = strlen((char *)data) + 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_bad.c:50:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp1 += strlen((char*)cp1)+1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/both_ok.c:50:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp1 += strlen((char*)cp1)+1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_bad.c:47:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp1 += strlen((char*)cp1)+1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CA-1999-14/rrextract-sig/expand_ok.c:47:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp1 += strlen((char*)cp1)+1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:77:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(queryname, net_queryname, sizeof queryname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_bad.c:79:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dname, net_dname, sizeof dname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:77:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(queryname, net_queryname, sizeof queryname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/big_ok.c:79:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dname, net_dname, sizeof dname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:69:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(queryname, net_queryname, sizeof queryname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_bad.c:71:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dname, net_dname, sizeof dname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:69:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(queryname, net_queryname, sizeof queryname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/med_ok.c:71:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dname, net_dname, sizeof dname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:31:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(queryname, net_queryname, sizeof queryname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_bad.c:33:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dname, net_dname, sizeof dname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:31:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(queryname, net_queryname, sizeof queryname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/bind/CVE-2001-0011/nslookupComplain/small_ok.c:33:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dname, net_dname, sizeof dname); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/nonsimp_bad.c:12:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncpy(request.data.winsreq, argp->key.name, strlen(argp->key.name)) ; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/samba/CVE-2007-0453/_nss_winbind_ipnodes_getbyname/simp_bad.c:9:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncpy(winsreq, name, strlen(name)) ; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:170:16: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c1 = fgetc(e->e_dfp)) != EOF) data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:177:10: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c2 = fgetc(e->e_dfp); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:184:10: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c3 = fgetc(e->e_dfp); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-1999-0047/complete/mime2-bad.c:191:10: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c4 = fgetc(e->e_dfp); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_bad.c:21:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (rr_txt, (char *) p + 1, *p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_cast_ok.c:21:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (rr_txt, (char *) p + 1, *p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_no_cast_bad.c:20:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (rr_txt, (char *) p + 1, *p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-0906/parse_dns_reply/parse_dns_reply_no_cast_ok.c:20:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (rr_txt, (char *) p + 1, *p); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2002-1337/complete/crackaddr_bad.c:526:3: [1] (buffer) scanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. scanf("%99s", address); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_one_gecos_ok.c:34:14: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy (buf + j, login, sizeof (buf) - j); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/buildfname/buildfname_arr_two_gecos_ok.c:32:14: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy (buf + j, login, sizeof (buf) - j); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/sendmail/CVE-2003-0681/complete/util-bad.c:105:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l += strlen(login); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:33:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(result, "."); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_bad.c:67:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr = where + strlen(curpath + where) - 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:33:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(result, "."); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:67:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr = where + strlen(curpath + where) - 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:90:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(linkpath, "/", MAXPATHLEN-strlen(linkpath)-1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:91:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:91:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:95:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(linkpath, where, MAXPATHLEN-strlen(linkpath)- 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_ok.c:97:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath) >= MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_bad.c:33:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(result, "."); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:33:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(result, "."); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:70:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(linkpath, "/", MAXPATHLEN-strlen(linkpath)-1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:71:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:71:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:75:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(linkpath, where, MAXPATHLEN-strlen(linkpath)- 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/prefix_simp_ok.c:77:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath) >= MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:27:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(linkpath, "/", MAXPATHLEN-strlen(linkpath)-1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:28:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:28:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath)+strlen(where)>=MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:32:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(linkpath, where, MAXPATHLEN-strlen(linkpath)- 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-linkpath/strcpy_strcat_ok.c:34:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(linkpath) >= MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:33:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(result, "."); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_bad.c:67:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr = where + strlen(curpath + where) - 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:33:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(result, "."); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:67:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr = where + strlen(curpath + where) - 1; data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:76:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(namebuf, "/", MAXPATHLEN-strlen(namebuf)-1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_ok.c:79:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(namebuf, curpath + where, MAXPATHLEN-strlen(namebuf)-1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_bad.c:33:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(result, "."); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:33:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(result, "."); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:56:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(namebuf, "/", MAXPATHLEN-strlen(namebuf)-1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/iter_ints_simp_ok.c:59:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(namebuf, curpath + where, MAXPATHLEN-strlen(namebuf)-1); } data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-1999-0368/realpath-namebuf/strcpy_strcat_ok.c:23:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r_strncat(namebuf, curpath, MAXPATHLEN-strlen(namebuf)-1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:13:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(resolved, path, MAXPATHLEN - 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:30:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:30:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_bad.c:34:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:13:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(resolved, path, MAXPATHLEN - 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:30:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:30:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/almost_simple_ok.c:34:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:13:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(resolved, path, MAXPATHLEN - 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:40:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:40:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_bad.c:44:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:13:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(resolved, path, MAXPATHLEN - 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:40:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:40:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/istrrchr_ok.c:44:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:13:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(resolved, path, MAXPATHLEN - 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:55:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:55:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_bad.c:59:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:13:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(resolved, path, MAXPATHLEN - 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:55:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:55:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/no_symlinks_ok.c:59:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:23:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:23:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_bad.c:27:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:23:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:23:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/simple_ok.c:27:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:12:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(resolved, path, MAXPATHLEN - 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:85:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:85:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_bad.c:89:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:12:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(resolved, path, MAXPATHLEN - 1); data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:85:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:85:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resolved) + strlen(wbuf) + !rootd + 1 > MAXPATHLEN) { data/frama-c-20200625+scandium/tests/verisec/suite/programs/apps/wu-ftpd/CVE-2003-0466/fb_realpath/symlinks_ok.c:89:14: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(resolved, "/"); ANALYSIS SUMMARY: Hits = 1485 Lines analyzed = 114743 in approximately 4.14 seconds (27746 lines/second) Physical Source Lines of Code (SLOC) = 74384 Hits@level = [0] 444 [1] 362 [2] 884 [3] 77 [4] 145 [5] 17 Hits@level+ = [0+] 1929 [1+] 1485 [2+] 1123 [3+] 239 [4+] 162 [5+] 17 Hits/KSLOC@level+ = [0+] 25.933 [1+] 19.964 [2+] 15.0973 [3+] 3.21306 [4+] 2.17789 [5+] 0.228544 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.