Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/glpk-4.65/examples/cplex/cplex.c Examining data/glpk-4.65/examples/cplex/cplex.h Examining data/glpk-4.65/examples/glpsol.c Examining data/glpk-4.65/examples/iptsamp.c Examining data/glpk-4.65/examples/mplsamp1.c Examining data/glpk-4.65/examples/mplsamp2.c Examining data/glpk-4.65/examples/netgen.c Examining data/glpk-4.65/examples/nppsamp.c Examining data/glpk-4.65/examples/oldapi/lpx.c Examining data/glpk-4.65/examples/oldapi/lpx.h Examining data/glpk-4.65/examples/oldapi/lpxsamp.c Examining data/glpk-4.65/examples/sample.c Examining data/glpk-4.65/examples/spxsamp1.c Examining data/glpk-4.65/examples/spxsamp2.c Examining data/glpk-4.65/examples/threads/multiseed.c Examining data/glpk-4.65/examples/threads/thread.h Examining data/glpk-4.65/examples/tsp/main.c Examining data/glpk-4.65/examples/tsp/maxflow.c Examining data/glpk-4.65/examples/tsp/maxflow.h Examining data/glpk-4.65/examples/tsp/mincut.c Examining data/glpk-4.65/examples/tsp/mincut.h Examining data/glpk-4.65/examples/tsp/misc.c Examining data/glpk-4.65/examples/tsp/misc.h Examining data/glpk-4.65/examples/tsp/tsplib.c Examining data/glpk-4.65/examples/tsp/tsplib.h Examining data/glpk-4.65/src/amd/amd.h Examining data/glpk-4.65/src/amd/amd_1.c Examining data/glpk-4.65/src/amd/amd_2.c Examining data/glpk-4.65/src/amd/amd_aat.c Examining data/glpk-4.65/src/amd/amd_control.c Examining data/glpk-4.65/src/amd/amd_defaults.c Examining data/glpk-4.65/src/amd/amd_dump.c Examining data/glpk-4.65/src/amd/amd_info.c Examining data/glpk-4.65/src/amd/amd_internal.h Examining data/glpk-4.65/src/amd/amd_order.c Examining data/glpk-4.65/src/amd/amd_postorder.c Examining data/glpk-4.65/src/amd/amd_post_tree.c Examining data/glpk-4.65/src/amd/amd_preprocess.c Examining data/glpk-4.65/src/amd/amd_valid.c Examining data/glpk-4.65/src/api/advbas.c Examining data/glpk-4.65/src/api/asnhall.c Examining data/glpk-4.65/src/api/asnlp.c Examining data/glpk-4.65/src/api/asnokalg.c Examining data/glpk-4.65/src/api/ckasn.c Examining data/glpk-4.65/src/api/ckcnf.c Examining data/glpk-4.65/src/api/cplex.c Examining data/glpk-4.65/src/api/cpp.c Examining data/glpk-4.65/src/api/cpxbas.c Examining data/glpk-4.65/src/api/graph.c Examining data/glpk-4.65/src/api/gridgen.c Examining data/glpk-4.65/src/api/intfeas1.c Examining data/glpk-4.65/src/api/maxffalg.c Examining data/glpk-4.65/src/api/maxflp.c Examining data/glpk-4.65/src/api/mcflp.c Examining data/glpk-4.65/src/api/mcfokalg.c Examining data/glpk-4.65/src/api/mcfrelax.c Examining data/glpk-4.65/src/api/minisat1.c Examining data/glpk-4.65/src/api/mpl.c Examining data/glpk-4.65/src/api/mps.c Examining data/glpk-4.65/src/api/netgen.c Examining data/glpk-4.65/src/api/npp.c Examining data/glpk-4.65/src/api/pript.c Examining data/glpk-4.65/src/api/prmip.c Examining data/glpk-4.65/src/api/prob.h Examining data/glpk-4.65/src/api/prob1.c Examining data/glpk-4.65/src/api/prob2.c Examining data/glpk-4.65/src/api/prob3.c Examining data/glpk-4.65/src/api/prob4.c Examining data/glpk-4.65/src/api/prob5.c Examining data/glpk-4.65/src/api/prrngs.c Examining data/glpk-4.65/src/api/prsol.c Examining data/glpk-4.65/src/api/rdasn.c Examining data/glpk-4.65/src/api/rdcc.c Examining data/glpk-4.65/src/api/rdcnf.c Examining data/glpk-4.65/src/api/rdipt.c Examining data/glpk-4.65/src/api/rdmaxf.c Examining data/glpk-4.65/src/api/rdmcf.c Examining data/glpk-4.65/src/api/rdmip.c Examining data/glpk-4.65/src/api/rdprob.c Examining data/glpk-4.65/src/api/rdsol.c Examining data/glpk-4.65/src/api/rmfgen.c Examining data/glpk-4.65/src/api/strong.c Examining data/glpk-4.65/src/api/topsort.c Examining data/glpk-4.65/src/api/wcliqex.c Examining data/glpk-4.65/src/api/weak.c Examining data/glpk-4.65/src/api/wrasn.c Examining data/glpk-4.65/src/api/wrcc.c Examining data/glpk-4.65/src/api/wrcnf.c Examining data/glpk-4.65/src/api/wript.c Examining data/glpk-4.65/src/api/wrmaxf.c Examining data/glpk-4.65/src/api/wrmcf.c Examining data/glpk-4.65/src/api/wrmip.c Examining data/glpk-4.65/src/api/wrprob.c Examining data/glpk-4.65/src/api/wrsol.c Examining data/glpk-4.65/src/bflib/btf.c Examining data/glpk-4.65/src/bflib/btf.h Examining data/glpk-4.65/src/bflib/btfint.c Examining data/glpk-4.65/src/bflib/btfint.h Examining data/glpk-4.65/src/bflib/fhv.c Examining data/glpk-4.65/src/bflib/fhv.h Examining data/glpk-4.65/src/bflib/fhvint.c Examining data/glpk-4.65/src/bflib/fhvint.h Examining data/glpk-4.65/src/bflib/ifu.c Examining data/glpk-4.65/src/bflib/ifu.h Examining data/glpk-4.65/src/bflib/luf.c Examining data/glpk-4.65/src/bflib/luf.h Examining data/glpk-4.65/src/bflib/lufint.c Examining data/glpk-4.65/src/bflib/lufint.h Examining data/glpk-4.65/src/bflib/scf.c Examining data/glpk-4.65/src/bflib/scf.h Examining data/glpk-4.65/src/bflib/scfint.c Examining data/glpk-4.65/src/bflib/scfint.h Examining data/glpk-4.65/src/bflib/sgf.c Examining data/glpk-4.65/src/bflib/sgf.h Examining data/glpk-4.65/src/bflib/sva.c Examining data/glpk-4.65/src/bflib/sva.h Examining data/glpk-4.65/src/colamd/colamd.c Examining data/glpk-4.65/src/colamd/colamd.h Examining data/glpk-4.65/src/draft/bfd.c Examining data/glpk-4.65/src/draft/bfd.h Examining data/glpk-4.65/src/draft/bfx.c Examining data/glpk-4.65/src/draft/bfx.h Examining data/glpk-4.65/src/draft/draft.h Examining data/glpk-4.65/src/draft/glpapi06.c Examining data/glpk-4.65/src/draft/glpapi07.c Examining data/glpk-4.65/src/draft/glpapi08.c Examining data/glpk-4.65/src/draft/glpapi09.c Examining data/glpk-4.65/src/draft/glpapi10.c Examining data/glpk-4.65/src/draft/glpapi12.c Examining data/glpk-4.65/src/draft/glpapi13.c Examining data/glpk-4.65/src/draft/glphbm.c Examining data/glpk-4.65/src/draft/glphbm.h Examining data/glpk-4.65/src/draft/glpios01.c Examining data/glpk-4.65/src/draft/glpios02.c Examining data/glpk-4.65/src/draft/glpios07.c Examining data/glpk-4.65/src/draft/glpios09.c Examining data/glpk-4.65/src/draft/glpios11.c Examining data/glpk-4.65/src/draft/glpios12.c Examining data/glpk-4.65/src/draft/glpipm.c Examining data/glpk-4.65/src/draft/glpipm.h Examining data/glpk-4.65/src/draft/glpmat.c Examining data/glpk-4.65/src/draft/glpmat.h Examining data/glpk-4.65/src/draft/glprgr.c Examining data/glpk-4.65/src/draft/glprgr.h Examining data/glpk-4.65/src/draft/glpscl.c Examining data/glpk-4.65/src/draft/glpspm.c Examining data/glpk-4.65/src/draft/glpspm.h Examining data/glpk-4.65/src/draft/glpssx.h Examining data/glpk-4.65/src/draft/glpssx01.c Examining data/glpk-4.65/src/draft/glpssx02.c Examining data/glpk-4.65/src/draft/ios.h Examining data/glpk-4.65/src/draft/lux.c Examining data/glpk-4.65/src/draft/lux.h Examining data/glpk-4.65/src/draft/glpios03.c Examining data/glpk-4.65/src/env/alloc.c Examining data/glpk-4.65/src/env/dlsup.c Examining data/glpk-4.65/src/env/env.c Examining data/glpk-4.65/src/env/env.h Examining data/glpk-4.65/src/env/error.c Examining data/glpk-4.65/src/env/stdc.c Examining data/glpk-4.65/src/env/stdc.h Examining data/glpk-4.65/src/env/stdout.c Examining data/glpk-4.65/src/env/stream.c Examining data/glpk-4.65/src/env/time.c Examining data/glpk-4.65/src/env/tls.c Examining data/glpk-4.65/src/glpk.h Examining data/glpk-4.65/src/intopt/cfg.c Examining data/glpk-4.65/src/intopt/cfg.h Examining data/glpk-4.65/src/intopt/cfg1.c Examining data/glpk-4.65/src/intopt/cfg2.c Examining data/glpk-4.65/src/intopt/clqcut.c Examining data/glpk-4.65/src/intopt/covgen.c Examining data/glpk-4.65/src/intopt/fpump.c Examining data/glpk-4.65/src/intopt/gmicut.c Examining data/glpk-4.65/src/intopt/gmigen.c Examining data/glpk-4.65/src/intopt/mirgen.c Examining data/glpk-4.65/src/intopt/spv.c Examining data/glpk-4.65/src/intopt/spv.h Examining data/glpk-4.65/src/minisat/minisat.c Examining data/glpk-4.65/src/minisat/minisat.h Examining data/glpk-4.65/src/misc/avl.c Examining data/glpk-4.65/src/misc/avl.h Examining data/glpk-4.65/src/misc/bignum.c Examining data/glpk-4.65/src/misc/bignum.h Examining data/glpk-4.65/src/misc/dimacs.c Examining data/glpk-4.65/src/misc/dimacs.h Examining data/glpk-4.65/src/misc/dmp.c Examining data/glpk-4.65/src/misc/dmp.h Examining data/glpk-4.65/src/misc/ffalg.c Examining data/glpk-4.65/src/misc/ffalg.h Examining data/glpk-4.65/src/misc/fp2rat.c Examining data/glpk-4.65/src/misc/fvs.c Examining data/glpk-4.65/src/misc/fvs.h Examining data/glpk-4.65/src/misc/gcd.c Examining data/glpk-4.65/src/misc/jd.c Examining data/glpk-4.65/src/misc/jd.h Examining data/glpk-4.65/src/misc/keller.c Examining data/glpk-4.65/src/misc/keller.h Examining data/glpk-4.65/src/misc/ks.c Examining data/glpk-4.65/src/misc/ks.h Examining data/glpk-4.65/src/misc/mc13d.c Examining data/glpk-4.65/src/misc/mc13d.h Examining data/glpk-4.65/src/misc/mc21a.c Examining data/glpk-4.65/src/misc/mc21a.h Examining data/glpk-4.65/src/misc/misc.h Examining data/glpk-4.65/src/misc/mt1.c Examining data/glpk-4.65/src/misc/mt1.h Examining data/glpk-4.65/src/misc/mygmp.c Examining data/glpk-4.65/src/misc/mygmp.h Examining data/glpk-4.65/src/misc/okalg.c Examining data/glpk-4.65/src/misc/okalg.h Examining data/glpk-4.65/src/misc/qmd.c Examining data/glpk-4.65/src/misc/qmd.h Examining data/glpk-4.65/src/misc/relax4.c Examining data/glpk-4.65/src/misc/relax4.h Examining data/glpk-4.65/src/misc/rng.c Examining data/glpk-4.65/src/misc/rng.h Examining data/glpk-4.65/src/misc/rng1.c Examining data/glpk-4.65/src/misc/round2n.c Examining data/glpk-4.65/src/misc/str2int.c Examining data/glpk-4.65/src/misc/str2num.c Examining data/glpk-4.65/src/misc/strspx.c Examining data/glpk-4.65/src/misc/strtrim.c Examining data/glpk-4.65/src/misc/triang.c Examining data/glpk-4.65/src/misc/triang.h Examining data/glpk-4.65/src/misc/wclique.c Examining data/glpk-4.65/src/misc/wclique.h Examining data/glpk-4.65/src/misc/wclique1.c Examining data/glpk-4.65/src/misc/wclique1.h Examining data/glpk-4.65/src/mpl/mpl.h Examining data/glpk-4.65/src/mpl/mpl1.c Examining data/glpk-4.65/src/mpl/mpl2.c Examining data/glpk-4.65/src/mpl/mpl3.c Examining data/glpk-4.65/src/mpl/mpl4.c Examining data/glpk-4.65/src/mpl/mpl5.c Examining data/glpk-4.65/src/mpl/mpl6.c Examining data/glpk-4.65/src/mpl/mplsql.c Examining data/glpk-4.65/src/mpl/mplsql.h Examining data/glpk-4.65/src/npp/npp.h Examining data/glpk-4.65/src/npp/npp1.c Examining data/glpk-4.65/src/npp/npp2.c Examining data/glpk-4.65/src/npp/npp3.c Examining data/glpk-4.65/src/npp/npp4.c Examining data/glpk-4.65/src/npp/npp5.c Examining data/glpk-4.65/src/npp/npp6.c Examining data/glpk-4.65/src/proxy/main.c Examining data/glpk-4.65/src/proxy/proxy.c Examining data/glpk-4.65/src/proxy/proxy.h Examining data/glpk-4.65/src/proxy/proxy1.c Examining data/glpk-4.65/src/simplex/simplex.h Examining data/glpk-4.65/src/simplex/spxat.c Examining data/glpk-4.65/src/simplex/spxat.h Examining data/glpk-4.65/src/simplex/spxchuzc.c Examining data/glpk-4.65/src/simplex/spxchuzc.h Examining data/glpk-4.65/src/simplex/spxchuzr.c Examining data/glpk-4.65/src/simplex/spxchuzr.h Examining data/glpk-4.65/src/simplex/spxlp.c Examining data/glpk-4.65/src/simplex/spxlp.h Examining data/glpk-4.65/src/simplex/spxnt.c Examining data/glpk-4.65/src/simplex/spxnt.h Examining data/glpk-4.65/src/simplex/spxprim.c Examining data/glpk-4.65/src/simplex/spxprob.c Examining data/glpk-4.65/src/simplex/spxprob.h Examining data/glpk-4.65/src/simplex/spychuzc.c Examining data/glpk-4.65/src/simplex/spychuzc.h Examining data/glpk-4.65/src/simplex/spychuzr.c Examining data/glpk-4.65/src/simplex/spychuzr.h Examining data/glpk-4.65/src/simplex/spydual.c Examining data/glpk-4.65/src/zlib/adler32.c Examining data/glpk-4.65/src/zlib/compress.c Examining data/glpk-4.65/src/zlib/crc32.c Examining data/glpk-4.65/src/zlib/crc32.h Examining data/glpk-4.65/src/zlib/deflate.c Examining data/glpk-4.65/src/zlib/deflate.h Examining data/glpk-4.65/src/zlib/gzclose.c Examining data/glpk-4.65/src/zlib/gzguts.h Examining data/glpk-4.65/src/zlib/gzlib.c Examining data/glpk-4.65/src/zlib/gzread.c Examining data/glpk-4.65/src/zlib/gzwrite.c Examining data/glpk-4.65/src/zlib/inffast.c Examining data/glpk-4.65/src/zlib/inffast.h Examining data/glpk-4.65/src/zlib/inffixed.h Examining data/glpk-4.65/src/zlib/inflate.c Examining data/glpk-4.65/src/zlib/inflate.h Examining data/glpk-4.65/src/zlib/inftrees.c Examining data/glpk-4.65/src/zlib/inftrees.h Examining data/glpk-4.65/src/zlib/trees.c Examining data/glpk-4.65/src/zlib/trees.h Examining data/glpk-4.65/src/zlib/uncompr.c Examining data/glpk-4.65/src/zlib/zconf.h Examining data/glpk-4.65/src/zlib/zio.c Examining data/glpk-4.65/src/zlib/zio.h Examining data/glpk-4.65/src/zlib/zlib.h Examining data/glpk-4.65/src/zlib/zutil.c Examining data/glpk-4.65/src/zlib/zutil.h FINAL RESULTS: data/glpk-4.65/examples/cplex/cplex.c:206:10: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(buffer, arg); data/glpk-4.65/examples/cplex/cplex.c:986:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, glp_get_prob_name(lp->prob)); data/glpk-4.65/examples/cplex/cplex.c:1314:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buffer, "CPLEX Error %5d: %s.\n", errcode, string); data/glpk-4.65/examples/threads/multiseed.c:78:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(task->buf + task->pos, text); data/glpk-4.65/examples/tsp/tsplib.c:247:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tsp->name, csa->token); data/glpk-4.65/examples/tsp/tsplib.c:285:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tsp->comment, csa->token); data/glpk-4.65/src/amd/amd_dump.c:40:9: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. fscanf (f, ID, &AMD_debug) ; data/glpk-4.65/src/api/cplex.c:1049:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rname, name); data/glpk-4.65/src/api/cplex.c:1065:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cname, name); data/glpk-4.65/src/api/cplex.c:1140:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(line, " %s:", name); data/glpk-4.65/src/api/cplex.c:1148:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " + 0 %s", name); /* empty column */ data/glpk-4.65/src/api/cplex.c:1150:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " + %s", name); data/glpk-4.65/src/api/cplex.c:1152:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " - %s", name); data/glpk-4.65/src/api/cplex.c:1154:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " + %.*g %s", DBL_DIG, +col->coef, name); data/glpk-4.65/src/api/cplex.c:1156:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " - %.*g %s", DBL_DIG, -col->coef, name); data/glpk-4.65/src/api/cplex.c:1159:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(line, term); data/glpk-4.65/src/api/cplex.c:1164:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " 0 %s", col_name(csa, 1, name)); data/glpk-4.65/src/api/cplex.c:1165:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(line, term); data/glpk-4.65/src/api/cplex.c:1178:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(line, " %s:", name); data/glpk-4.65/src/api/cplex.c:1183:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " + %s", name); data/glpk-4.65/src/api/cplex.c:1185:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " - %s", name); data/glpk-4.65/src/api/cplex.c:1187:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " + %.*g %s", DBL_DIG, +aij->val, name); data/glpk-4.65/src/api/cplex.c:1189:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " - %.*g %s", DBL_DIG, -aij->val, name); data/glpk-4.65/src/api/cplex.c:1192:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(line, term); data/glpk-4.65/src/api/cplex.c:1199:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(line, term); data/glpk-4.65/src/api/cplex.c:1203:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(term, " 0 %s", col_name(csa, 1, name)); data/glpk-4.65/src/api/cplex.c:1204:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(line, term); data/glpk-4.65/src/api/cplex.c:1217:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(line, term); data/glpk-4.65/src/api/graph.c:118:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(G->name, name); data/glpk-4.65/src/api/graph.c:217:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(v->name, name); data/glpk-4.65/src/api/mps.c:470:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, csa->field); data/glpk-4.65/src/api/mps.c:601:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, csa->field); data/glpk-4.65/src/api/mps.c:681:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, csa->field); data/glpk-4.65/src/api/mps.c:780:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(type, csa->field); data/glpk-4.65/src/api/mps.c:799:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, csa->field); data/glpk-4.65/src/api/mps.c:1119:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(csa->field, csa->P->name); data/glpk-4.65/src/api/mps.c:1133:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(csa->field, csa->P->row[i]->name); data/glpk-4.65/src/api/mps.c:1148:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(csa->field, csa->P->col[j]->name); data/glpk-4.65/src/api/prob1.c:152:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lp->name, name); data/glpk-4.65/src/api/prob1.c:193:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lp->obj, name); data/glpk-4.65/src/api/prob1.c:456:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(row->name, name); data/glpk-4.65/src/api/prob1.c:513:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(col->name, name); data/glpk-4.65/src/draft/glphbm.c:127:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dsa->card, buf); data/glpk-4.65/src/draft/glpios01.c:489:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(r->name, name); data/glpk-4.65/src/draft/glpios01.c:1450:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cut->name, name); data/glpk-4.65/src/draft/glpios01.c:1671:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fn, T->save_sol); data/glpk-4.65/src/draft/glpios01.c:1676:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fn, &mark[1]); data/glpk-4.65/src/draft/glpios03.c:61:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(best_mip, "%17s", "not found yet"); data/glpk-4.65/src/draft/glpios03.c:67:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(best_bound, "%17s", "tree is empty"); data/glpk-4.65/src/draft/glpios03.c:71:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(best_bound, "%17s", "-inf"); data/glpk-4.65/src/draft/glpios03.c:73:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(best_bound, "%17s", "+inf"); data/glpk-4.65/src/draft/glpios03.c:96:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(rel_gap, "%6s", ""); data/glpk-4.65/src/env/stdout.c:82:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(env->term_buf, fmt, arg); data/glpk-4.65/src/env/stdout.c:112:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(env->term_buf, fmt, arg); data/glpk-4.65/src/env/stream.c:442:13: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. nnn = vsprintf(env->term_buf, fmt, arg); data/glpk-4.65/src/minisat/minisat.c:64:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define printf xprintf data/glpk-4.65/src/minisat/minisat.c:96:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(L_LIT" ",L_lit(begin[i])); data/glpk-4.65/src/minisat/minisat.c:479:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(L_IND"enqueue("L_LIT")\n", L_ind, L_lit(l)); data/glpk-4.65/src/minisat/minisat.c:490:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(L_IND"bind("L_LIT")\n", L_ind, L_lit(l)); data/glpk-4.65/src/minisat/minisat.c:509:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(L_IND"assume("L_LIT")\n", L_ind, L_lit(l)); data/glpk-4.65/src/minisat/minisat.c:737:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(L_IND"Learnt {", L_ind); data/glpk-4.65/src/minisat/minisat.c:739:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(" "L_LIT, L_lit(lits[i])); data/glpk-4.65/src/minisat/minisat.c:917:13: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(L_IND"**CONFLICT**\n", L_ind); data/glpk-4.65/src/mpl/mpl1.c:144:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mpl->b_image, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:151:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mpl->image, mpl->f_image); data/glpk-4.65/src/mpl/mpl1.c:442:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mpl->f_image, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:447:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mpl->image, mpl->b_image); data/glpk-4.65/src/mpl/mpl1.c:819:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(arg.str, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:1235:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(func, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:1565:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[dim].name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:1754:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:1965:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:2324:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:2740:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:2753:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:2841:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:2873:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:2912:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:2973:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(set->name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:2988:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(set->alias, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3218:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(par->name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3234:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(par->alias, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3307:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). cond->rho = O_LT, strcpy(opstr, mpl->image); break; data/glpk-4.65/src/mpl/mpl1.c:3309:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). cond->rho = O_LE, strcpy(opstr, mpl->image); break; data/glpk-4.65/src/mpl/mpl1.c:3311:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). cond->rho = O_EQ, strcpy(opstr, mpl->image); break; data/glpk-4.65/src/mpl/mpl1.c:3313:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). cond->rho = O_GE, strcpy(opstr, mpl->image); break; data/glpk-4.65/src/mpl/mpl1.c:3315:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). cond->rho = O_GT, strcpy(opstr, mpl->image); break; data/glpk-4.65/src/mpl/mpl1.c:3317:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). cond->rho = O_NE, strcpy(opstr, mpl->image); break; data/glpk-4.65/src/mpl/mpl1.c:3476:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(var->name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3488:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(var->alias, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3582:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3670:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(con->name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3683:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(con->alias, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3725:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(opstr, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3871:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(obj->name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3884:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(obj->alias, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3979:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tab->name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:3984:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tab->alias, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:4089:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fld->name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:4151:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:4157:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, in->par->name); data/glpk-4.65/src/mpl/mpl1.c:4161:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(in->name, name); data/glpk-4.65/src/mpl/mpl1.c:4182:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:4199:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, mpl->image); data/glpk-4.65/src/mpl/mpl1.c:4206:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(out->name, name); data/glpk-4.65/src/mpl/mpl3.c:433:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str, buf); data/glpk-4.65/src/mpl/mpl3.c:527:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). return strcpy(buf, str); data/glpk-4.65/src/mpl/mpl3.c:735:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, format_symbol(mpl, sym1)); data/glpk-4.65/src/mpl/mpl3.c:742:56: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). return create_symbol_str(mpl, create_string(mpl, strcat(str1, data/glpk-4.65/src/mpl/mpl3.c:2344:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, format_tuple(mpl, '(', memb->tuple)); data/glpk-4.65/src/mpl/mpl3.c:2843:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(buf, format_symbol(mpl, bound)); data/glpk-4.65/src/mpl/mpl3.c:2852:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(buf, format_symbol(mpl, bound)); data/glpk-4.65/src/mpl/mpl3.c:2862:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(buf, format_symbol(mpl, bound)); data/glpk-4.65/src/mpl/mpl3.c:2872:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(buf, format_symbol(mpl, bound)); data/glpk-4.65/src/mpl/mpl3.c:2881:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(buf, format_symbol(mpl, bound)); data/glpk-4.65/src/mpl/mpl3.c:2891:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(buf, format_symbol(mpl, bound)); data/glpk-4.65/src/mpl/mpl3.c:5034:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dca->str[k], str); data/glpk-4.65/src/mpl/mpl3.c:5067:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dca->str[k], buf); data/glpk-4.65/src/mpl/mpl3.c:5123:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dca->arg[k], buf); data/glpk-4.65/src/mpl/mpl3.c:5760:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(buf, fmt, arg); data/glpk-4.65/src/mpl/mpl3.c:5934:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mpl->prt_file, fname); data/glpk-4.65/src/mpl/mpl4.c:353:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mpl->out_file, file); data/glpk-4.65/src/mpl/mpl4.c:381:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(buf, fmt, arg); data/glpk-4.65/src/mpl/mpl4.c:421:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(msg, fmt, arg); data/glpk-4.65/src/mpl/mpl4.c:457:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(msg, fmt, arg); data/glpk-4.65/src/mpl/mpl4.c:628:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mpl->mod_file, mpl->in_file); data/glpk-4.65/src/mpl/mpl4.c:876:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, mpl->row[i]->con->name); data/glpk-4.65/src/mpl/mpl4.c:1106:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, mpl->col[j]->var->name); data/glpk-4.65/src/mpl/mpl5.c:358:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, week[weekday(j)-1]); data/glpk-4.65/src/mpl/mpl5.c:366:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, moon[month-1]); data/glpk-4.65/src/mpl/mpl5.c:456:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, hh <= 11 ? "AM" : "PM"); data/glpk-4.65/src/mpl/mpl5.c:461:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, hh <= 11 ? "am" : "pm"); data/glpk-4.65/src/mpl/mpl5.c:465:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%02d:%02d:%02d %s", data/glpk-4.65/src/mpl/mpl6.c:237:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(csv->fname, mpl_tab_get_arg(dca, 2)); data/glpk-4.65/src/mpl/mpl6.c:727:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dbf->fname, mpl_tab_get_arg(dca, 2)); data/glpk-4.65/src/mpl/mplsql.c:130:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sqllines[i], mpl_tab_get_arg(dca, j1)); data/glpk-4.65/src/mpl/mplsql.c:246:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(query, field); data/glpk-4.65/src/mpl/mplsql.c:251:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(query, arg); data/glpk-4.65/src/mpl/mplsql.c:279:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(query, arg); data/glpk-4.65/src/mpl/mplsql.c:284:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(query, field); data/glpk-4.65/src/mpl/mplsql.c:804:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sql->query, arg); data/glpk-4.65/src/mpl/mplsql.c:871:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sql->query, arg); data/glpk-4.65/src/mpl/mplsql.c:948:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(template, sql->query); data/glpk-4.65/src/mpl/mplsql.c:975:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( query, part ); data/glpk-4.65/src/mpl/mplsql.c:983:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( query, num ); data/glpk-4.65/src/mpl/mplsql.c:996:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(query, part); data/glpk-4.65/src/mpl/mplsql.c:1361:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(arg, dsn); data/glpk-4.65/src/mpl/mplsql.c:1430:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (query, arg); data/glpk-4.65/src/mpl/mplsql.c:1501:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (query, arg); data/glpk-4.65/src/mpl/mplsql.c:1580:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(template, sql->query); data/glpk-4.65/src/mpl/mplsql.c:1607:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( query, part ); data/glpk-4.65/src/mpl/mplsql.c:1615:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( query, num ); data/glpk-4.65/src/mpl/mplsql.c:1628:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(query, part); data/glpk-4.65/src/npp/npp1.c:378:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(npp->name, orig->name); data/glpk-4.65/src/npp/npp1.c:382:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(npp->obj, orig->obj); data/glpk-4.65/src/npp/npp1.c:394:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(row->name, rrr->name); data/glpk-4.65/src/npp/npp1.c:435:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(col->name, ccc->name); data/glpk-4.65/src/zlib/gzlib.c:156:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(state->path, path); data/glpk-4.65/src/zlib/gzlib.c:514:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(state->msg, state->path); data/glpk-4.65/src/zlib/gzlib.c:516:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(state->msg, msg); data/glpk-4.65/src/zlib/gzwrite.c:319:11: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. (void)vsprintf(state->in, format, va); data/glpk-4.65/src/zlib/gzwrite.c:324:11: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. len = vsprintf((char *)state->in, format, va); data/glpk-4.65/src/zlib/gzwrite.c:329:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)vsnprintf(state->in, size, format, va); data/glpk-4.65/src/zlib/gzwrite.c:333:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = vsnprintf((char *)(state->in), size, format, va); data/glpk-4.65/src/zlib/gzwrite.c:393:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(state->in, format, a1, a2, a3, a4, a5, a6, a7, a8, data/glpk-4.65/src/zlib/gzwrite.c:398:11: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. len = sprintf(state->in, format, a1, a2, a3, a4, a5, a6, a7, a8, data/glpk-4.65/src/zlib/gzwrite.c:403:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(state->in, size, format, a1, a2, a3, a4, a5, a6, a7, a8, data/glpk-4.65/src/zlib/gzwrite.c:407:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf(state->in, size, format, a1, a2, a3, a4, a5, a6, a7, a8, data/glpk-4.65/src/zlib/zutil.h:67:40: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define Trace(x) { if (z_verbose >= 0) fprintf x; } data/glpk-4.65/src/zlib/zutil.h:68:40: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define Tracev(x) { if (z_verbose > 0) fprintf x; } data/glpk-4.65/src/zlib/zutil.h:69:40: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define Tracevv(x) {if (z_verbose > 1) fprintf x; } data/glpk-4.65/src/zlib/zutil.h:70:49: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define Tracec(c, x) {if (z_verbose > 0 && (c)) fprintf x; } data/glpk-4.65/src/zlib/zutil.h:71:50: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define Tracecv(c, x) {if (z_verbose > 1 && (c)) fprintf x; } data/glpk-4.65/examples/threads/thread.h:39:35: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. #define pthread_mutex_init(A,B) (InitializeCriticalSection(A),0) data/glpk-4.65/examples/threads/thread.h:40:35: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. #define pthread_mutex_lock(A) (EnterCriticalSection(A),0) data/glpk-4.65/src/api/gridgen.c:371:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #undef random data/glpk-4.65/src/api/gridgen.c:376:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int (*random)(struct csa *csa, double *); data/glpk-4.65/src/api/gridgen.c:391:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. arc_ptr->u = random(csa, capacities.parameter); data/glpk-4.65/src/api/gridgen.c:398:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. arc_ptr->u = random(csa, capacities.parameter); data/glpk-4.65/src/api/gridgen.c:405:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int (*random)(struct csa *csa, double *); data/glpk-4.65/src/api/gridgen.c:424:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. { arc_ptr->cost = random(csa, arc_costs.parameter); data/glpk-4.65/src/api/gridgen.c:434:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. arc_ptr->cost = random(csa, arc_costs.parameter); data/glpk-4.65/src/api/rmfgen.c:171:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #undef random data/glpk-4.65/src/api/rmfgen.c:172:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define random(A) (int)(rng_unif_01(csa->rand) * (double)(A)) data/glpk-4.65/src/api/rmfgen.c:173:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define RANDOM(A, B) (int)(random((B) - (A) + 1) + (A)) data/glpk-4.65/src/env/dlsup.c:114:11: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. h = LoadLibrary(module); data/glpk-4.65/examples/cplex/cplex.c:201:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[510]; data/glpk-4.65/examples/cplex/cplex.c:248:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lp->rflag, rflag, rflen); data/glpk-4.65/examples/cplex/cplex.c:908:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255+1]; data/glpk-4.65/examples/cplex/cplex.c:1965:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void getfiletype(const char *filename, char type[3+1]) data/glpk-4.65/examples/cplex/cplex.c:1965:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void getfiletype(const char *filename, char type[3+1]) data/glpk-4.65/examples/cplex/cplex.c:1978:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(type, &filename[beg], end - beg); data/glpk-4.65/examples/cplex/cplex.c:1990:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[3+1]; data/glpk-4.65/examples/glpsol.c:76:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *in_data[1+DATA_MAX]; data/glpk-4.65/examples/glpsol.c:1433:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/glpk-4.65/examples/netgen.c:128:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[100+1]; data/glpk-4.65/examples/netgen.c:131:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(fname, "netgn%03d.min", parm[k-1][1]); data/glpk-4.65/examples/threads/multiseed.c:55:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN + 1]; data/glpk-4.65/examples/threads/multiseed.c:216:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n = atoi(argv[2]); data/glpk-4.65/examples/tsp/main.c:165:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[50]; data/glpk-4.65/examples/tsp/main.c:173:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "x[%d,%d]", i, j); data/glpk-4.65/examples/tsp/main.c:186:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "v[%d]", i); data/glpk-4.65/examples/tsp/main.c:289:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void write_tour(const char *fname, const int tour[/*1+n*/]) data/glpk-4.65/examples/tsp/main.c:293:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(fname, "w"); data/glpk-4.65/examples/tsp/tsplib.c:50:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[255+1]; data/glpk-4.65/examples/tsp/tsplib.c:88:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(csa->token, "EOF"); data/glpk-4.65/examples/tsp/tsplib.c:206:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). csa->fp = fopen(csa->fname, "r"); data/glpk-4.65/src/amd/amd_dump.c:33:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen ("debug.amd", "r") ; data/glpk-4.65/src/api/asnhall.c:147:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_x, &xij, sizeof(int)); data/glpk-4.65/src/api/asnlp.c:84:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char name[50+1]; data/glpk-4.65/src/api/asnlp.c:85:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "x[%d,%d]", a->tail->i, a->head->i); data/glpk-4.65/src/api/asnlp.c:94:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cost, (char *)a->data + a_cost, sizeof(double)); data/glpk-4.65/src/api/asnokalg.c:73:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, (char *)a->data + a_cost, sizeof(double)); data/glpk-4.65/src/api/asnokalg.c:139:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_x, &x[k], sizeof(int)); data/glpk-4.65/src/api/ckasn.c:50:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(&k, (char *)v->data + v_set, sizeof(int)); data/glpk-4.65/src/api/cplex.c:123:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char image[255+1]; data/glpk-4.65/src/api/cplex.c:406:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->ind[1], &ind[1], n_max * sizeof(int)); data/glpk-4.65/src/api/cplex.c:409:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->val[1], &val[1], n_max * sizeof(double)); data/glpk-4.65/src/api/cplex.c:413:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->flag[1], &flag[1], n_max * sizeof(char)); data/glpk-4.65/src/api/cplex.c:416:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->lb[1], &lb[1], n_max * sizeof(double)); data/glpk-4.65/src/api/cplex.c:419:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->ub[1], &ub[1], n_max * sizeof(double)); data/glpk-4.65/src/api/cplex.c:562:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[50]; data/glpk-4.65/src/api/cplex.c:563:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "r.%d", csa->count); data/glpk-4.65/src/api/cplex.c:1041:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *row_name(struct csa *csa, int i, char rname[255+1]) data/glpk-4.65/src/api/cplex.c:1041:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *row_name(struct csa *csa, int i, char rname[255+1]) data/glpk-4.65/src/api/cplex.c:1054:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(rname, "obj"); data/glpk-4.65/src/api/cplex.c:1056:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(rname, "r_%d", i); data/glpk-4.65/src/api/cplex.c:1060:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *col_name(struct csa *csa, int j, char cname[255+1]) data/glpk-4.65/src/api/cplex.c:1060:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *col_name(struct csa *csa, int j, char cname[255+1]) data/glpk-4.65/src/api/cplex.c:1070:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. fake: sprintf(cname, "x_%d", j); data/glpk-4.65/src/api/cplex.c:1076:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cname, "s_%d", j); data/glpk-4.65/src/api/cplex.c:1080:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cname, "x_%d", j); data/glpk-4.65/src/api/cplex.c:1084:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cname, "y_%d", j); data/glpk-4.65/src/api/cplex.c:1088:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cname, "z_%d", j); data/glpk-4.65/src/api/cplex.c:1104:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1000+1], term[500+1], name[255+1]; data/glpk-4.65/src/api/cplex.c:1196:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(term, " - ~r_%d", i); data/glpk-4.65/src/api/cplex.c:1208:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(term, " >= %.*g", DBL_DIG, row->lb); data/glpk-4.65/src/api/cplex.c:1210:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(term, " <= %.*g", DBL_DIG, row->ub); data/glpk-4.65/src/api/cplex.c:1212:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(term, " = %.*g", DBL_DIG, row->lb); data/glpk-4.65/src/api/cpp.c:90:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(&t[i], (char *)v->data + v_t, sizeof(double)); data/glpk-4.65/src/api/cpp.c:137:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_es, &es[i], sizeof(double)); data/glpk-4.65/src/api/cpp.c:143:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_ls, &ls[i], sizeof(double)); data/glpk-4.65/src/api/graph.c:163:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&G->v[1], &save[1], G->nv * sizeof(glp_vertex *)); data/glpk-4.65/src/api/gridgen.c:633:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &zero, sizeof(double)); data/glpk-4.65/src/api/gridgen.c:645:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &temp, sizeof(double)); data/glpk-4.65/src/api/gridgen.c:656:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &temp, sizeof(double)); data/glpk-4.65/src/api/gridgen.c:669:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cap, &temp, sizeof(double)); data/glpk-4.65/src/api/gridgen.c:673:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cost, &temp, sizeof(double)); data/glpk-4.65/src/api/maxffalg.c:75:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, (char *)a->data + a_cap, sizeof(double)); data/glpk-4.65/src/api/maxffalg.c:109:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_x, &temp, sizeof(double)); data/glpk-4.65/src/api/maxffalg.c:118:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_cut, &flag, sizeof(int)); data/glpk-4.65/src/api/maxflp.c:83:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char name[50+1]; data/glpk-4.65/src/api/maxflp.c:84:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "x[%d,%d]", a->tail->i, a->head->i); data/glpk-4.65/src/api/maxflp.c:94:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cap, (char *)a->data + a_cap, sizeof(double)); data/glpk-4.65/src/api/mcflp.c:67:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rhs, (char *)v->data + v_rhs, sizeof(double)); data/glpk-4.65/src/api/mcflp.c:78:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char name[50+1]; data/glpk-4.65/src/api/mcflp.c:79:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "x[%d,%d]", a->tail->i, a->head->i); data/glpk-4.65/src/api/mcflp.c:89:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&low, (char *)a->data + a_low, sizeof(double)); data/glpk-4.65/src/api/mcflp.c:93:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cap, (char *)a->data + a_cap, sizeof(double)); data/glpk-4.65/src/api/mcflp.c:104:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cost, (char *)a->data + a_cost, sizeof(double)); data/glpk-4.65/src/api/mcfokalg.c:63:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, (char *)v->data + v_rhs, sizeof(double)); data/glpk-4.65/src/api/mcfokalg.c:90:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, (char *)a->data + a_low, sizeof(double)); data/glpk-4.65/src/api/mcfokalg.c:100:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, (char *)a->data + a_cap, sizeof(double)); data/glpk-4.65/src/api/mcfokalg.c:110:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, (char *)a->data + a_cost, sizeof(double)); data/glpk-4.65/src/api/mcfokalg.c:125:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, (char *)v->data + v_rhs, sizeof(double)); data/glpk-4.65/src/api/mcfokalg.c:198:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_x, &temp, sizeof(double)); data/glpk-4.65/src/api/mcfokalg.c:207:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_pi, &temp, sizeof(double)); data/glpk-4.65/src/api/mcfrelax.c:103:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rhs, (char *)v->data + v_rhs, sizeof(double)); data/glpk-4.65/src/api/mcfrelax.c:129:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cost, (char *)a->data + a_cost, sizeof(double)); data/glpk-4.65/src/api/mcfrelax.c:139:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&low, (char *)a->data + a_low, sizeof(double)); data/glpk-4.65/src/api/mcfrelax.c:149:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cap, (char *)a->data + a_cap, sizeof(double)); data/glpk-4.65/src/api/mcfrelax.c:199:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&low, (char *)a->data + a_low, sizeof(double)); data/glpk-4.65/src/api/mcfrelax.c:205:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_x, &x, sizeof(double)); data/glpk-4.65/src/api/mcfrelax.c:209:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_rc, &rc, sizeof(double)); data/glpk-4.65/src/api/mcfrelax.c:212:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cost, (char *)a->data + a_cost, sizeof(double)); data/glpk-4.65/src/api/mps.c:127:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char field[255+1]; data/glpk-4.65/src/api/mps.c:451:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255+1], *flag; data/glpk-4.65/src/api/mps.c:568:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255+1], *flag; data/glpk-4.65/src/api/mps.c:648:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255+1], *flag; data/glpk-4.65/src/api/mps.c:749:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[2+1], name[255+1], *flag; data/glpk-4.65/src/api/mps.c:1105:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char field[255+1]; data/glpk-4.65/src/api/mps.c:1131:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(csa->field, "R%07d", i); data/glpk-4.65/src/api/mps.c:1146:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(csa->field, "C%07d", j); data/glpk-4.65/src/api/mps.c:1161:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(csa->field, "%.*E", dig-1, val); data/glpk-4.65/src/api/mps.c:1163:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(csa->field, "%.*G", dig, val); data/glpk-4.65/src/api/mps.c:1166:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(exp+1, "%d", atoi(exp+1)); data/glpk-4.65/src/api/mps.c:1166:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sprintf(exp+1, "%d", atoi(exp+1)); data/glpk-4.65/src/api/mps.c:1399:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *spec[2]; data/glpk-4.65/src/api/netgen.c:252:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &zero, sizeof(double)); data/glpk-4.65/src/api/netgen.c:308:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:442:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cap, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:446:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cost, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:476:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:621:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cap, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:625:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cost, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:650:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:679:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cap, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:683:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cost, &temp, sizeof(double)); data/glpk-4.65/src/api/netgen.c:988:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int scan(char card[80+1], int pos, int len) data/glpk-4.65/src/api/netgen.c:989:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char buf[10+1]; data/glpk-4.65/src/api/netgen.c:990:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &card[pos-1], len); data/glpk-4.65/src/api/netgen.c:992:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atoi(buf); data/glpk-4.65/src/api/netgen.c:997:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[80+1]; data/glpk-4.65/src/api/prob1.c:269:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lp->row[1], &save[1], lp->m * sizeof(GLPROW *)); data/glpk-4.65/src/api/prob1.c:375:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lp->col[1], &save[1], lp->n * sizeof(GLPCOL *)); data/glpk-4.65/src/api/prrngs.c:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *format(char buf[13+1], double x) data/glpk-4.65/src/api/prrngs.c:29:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *format(char buf[13+1], double x) data/glpk-4.65/src/api/prrngs.c:32:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, " -Inf"); data/glpk-4.65/src/api/prrngs.c:34:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, " +Inf"); data/glpk-4.65/src/api/prrngs.c:36:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(buf, "%13.5f", x); data/glpk-4.65/src/api/prrngs.c:40:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, " . "); data/glpk-4.65/src/api/prrngs.c:42:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, " .", 8); data/glpk-4.65/src/api/prrngs.c:44:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, " -.", 8); data/glpk-4.65/src/api/prrngs.c:48:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%13.6g", x); data/glpk-4.65/src/api/prrngs.c:63:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[13+1]; data/glpk-4.65/src/api/rdasn.c:126:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_set, &k, sizeof(int)); data/glpk-4.65/src/api/rdasn.c:154:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cost, &cost, sizeof(double)); data/glpk-4.65/src/api/rdcc.c:105:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_wgt, &w, sizeof(double)); data/glpk-4.65/src/api/rdcc.c:124:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_wgt, &w, sizeof(double)); data/glpk-4.65/src/api/rdmaxf.c:154:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cap, &cap, sizeof(double)); data/glpk-4.65/src/api/rdmcf.c:118:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &rhs, sizeof(double)); data/glpk-4.65/src/api/rdmcf.c:137:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_rhs, &rhs, sizeof(double)); data/glpk-4.65/src/api/rdmcf.c:172:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_low, &low, sizeof(double)); data/glpk-4.65/src/api/rdmcf.c:174:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cap, &cap, sizeof(double)); data/glpk-4.65/src/api/rdmcf.c:176:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cost, &cost, sizeof(double)); data/glpk-4.65/src/api/rmfgen.c:276:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)a->data + a_cap, &temp, sizeof(double)); data/glpk-4.65/src/api/rmfgen.c:293:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comm[10][80], *com1[10]; data/glpk-4.65/src/api/rmfgen.c:320:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(comm[0], "This file was generated by genrmf."); data/glpk-4.65/src/api/rmfgen.c:321:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(comm[1], "The parameters are: a: %d b: %d c1: %d c2: %d", data/glpk-4.65/src/api/rmfgen.c:341:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). seed = atoi(argv[++i]); data/glpk-4.65/src/api/rmfgen.c:343:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). a = atoi(argv[++i]); data/glpk-4.65/src/api/rmfgen.c:345:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). b = atoi(argv[++i]); data/glpk-4.65/src/api/rmfgen.c:347:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). c1 = atoi(argv[++i]); data/glpk-4.65/src/api/rmfgen.c:349:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). c2 = atoi(argv[++i]); data/glpk-4.65/src/api/strong.c:95:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_num, &k, sizeof(int)); data/glpk-4.65/src/api/topsort.c:116:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_num, &num[i], sizeof(int)); data/glpk-4.65/src/api/wcliqex.c:66:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(&t, (char *)G->v[i]->data + v_wgt, sizeof(double)); data/glpk-4.65/src/api/wcliqex.c:108:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)G->v[i]->data + v_set, &x, sizeof(int)); data/glpk-4.65/src/api/wcliqex.c:112:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)G->v[i]->data + v_set, &x, sizeof(int)); data/glpk-4.65/src/api/weak.c:140:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)v->data + v_num, &next[i], sizeof(int)); data/glpk-4.65/src/api/wrasn.c:75:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&k, (char *)v->data + v_set, sizeof(int)); data/glpk-4.65/src/api/wrasn.c:85:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cost, (char *)a->data + a_cost, sizeof(double)); data/glpk-4.65/src/api/wrcc.c:70:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&w, (char *)v->data + v_wgt, sizeof(double)); data/glpk-4.65/src/api/wrcnf.c:34:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[50]; data/glpk-4.65/src/api/wrcnf.c:61:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%d", j); data/glpk-4.65/src/api/wrmaxf.c:82:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cap, (char *)a->data + a_cap, sizeof(double)); data/glpk-4.65/src/api/wrmcf.c:82:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rhs, (char *)v->data + v_rhs, sizeof(double)); data/glpk-4.65/src/api/wrmcf.c:91:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&low, (char *)a->data + a_low, sizeof(double)); data/glpk-4.65/src/api/wrmcf.c:95:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cap, (char *)a->data + a_cap, sizeof(double)); data/glpk-4.65/src/api/wrmcf.c:99:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cost, (char *)a->data + a_cost, sizeof(double)); data/glpk-4.65/src/bflib/btf.c:62:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int)); data/glpk-4.65/src/bflib/btfint.c:100:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int)); data/glpk-4.65/src/bflib/btfint.c:101:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_val[ptr], &val[1], len * sizeof(double)); data/glpk-4.65/src/bflib/btfint.c:180:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[ptr], &ind[1], cnt * sizeof(int)); data/glpk-4.65/src/bflib/btfint.c:181:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_val[ptr], &val[1], cnt * sizeof(double)); data/glpk-4.65/src/bflib/btfint.c:196:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[ptr], &ind[cnt+1], len * sizeof(int)); data/glpk-4.65/src/bflib/btfint.c:197:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_val[ptr], &val[cnt+1], len * sizeof(double)); data/glpk-4.65/src/bflib/fhv.c:252:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int)); data/glpk-4.65/src/bflib/fhv.c:253:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_val[ptr], &val[1], len * sizeof(double)); data/glpk-4.65/src/bflib/fhv.c:431:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[ptr], &ind[1], nnz * sizeof(int)); data/glpk-4.65/src/bflib/fhv.c:432:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_val[ptr], &val[1], nnz * sizeof(double)); data/glpk-4.65/src/bflib/fhv.c:485:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int)); data/glpk-4.65/src/bflib/fhv.c:486:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_val[ptr], &val[1], len * sizeof(double)); data/glpk-4.65/src/bflib/fhvint.c:118:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x[1], &work[1], n * sizeof(double)); data/glpk-4.65/src/bflib/fhvint.c:141:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x[1], &work[1], n * sizeof(double)); data/glpk-4.65/src/bflib/ifu.c:316:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(w, x, n * sizeof(double)); data/glpk-4.65/src/bflib/ifu.c:386:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(x, w, n * sizeof(double)); data/glpk-4.65/src/bflib/luf.c:62:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[ptr], &ind[1], len * sizeof(int)); data/glpk-4.65/src/bflib/luf.c:63:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_val[ptr], &val[1], len * sizeof(double)); data/glpk-4.65/src/bflib/scf.c:94:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x[1], &w1[1], n0 * sizeof(double)); data/glpk-4.65/src/bflib/sgf.c:811:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sv_ind[fc_ptr[p]], &sv_ind[vc_ptr[q]], data/glpk-4.65/src/bflib/sva.c:352:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(&ind[sva->m_ptr], &ind[ptr[k]], data/glpk-4.65/src/bflib/sva.c:355:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val[sva->m_ptr], &val[ptr[k]], data/glpk-4.65/src/bflib/sva.c:473:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ind[ptr_k], &ind[ptr[k]], len_k * sizeof(int)); data/glpk-4.65/src/bflib/sva.c:474:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val[ptr_k], &val[ptr[k]], len_k * sizeof(double)); data/glpk-4.65/src/colamd/colamd.c:932:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *method, data/glpk-4.65/src/colamd/colamd.c:3195:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *method, data/glpk-4.65/src/colamd/colamd.c:3608:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen ("debug", "r") ; data/glpk-4.65/src/draft/bfd.c:85:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bfd->parm, parm, sizeof(glp_bfcp)); data/glpk-4.65/src/draft/bfd.c:92:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(parm, &bfd->parm, sizeof(glp_bfcp)); data/glpk-4.65/src/draft/bfd.c:110:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bfd->parm, parm, sizeof(glp_bfcp)); data/glpk-4.65/src/draft/glpapi09.c:342:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[50]; data/glpk-4.65/src/draft/glpapi09.c:347:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "none of"); data/glpk-4.65/src/draft/glpapi09.c:351:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "one of"); data/glpk-4.65/src/draft/glpapi09.c:353:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "all of"); data/glpk-4.65/src/draft/glpapi09.c:355:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%d of", nb); data/glpk-4.65/src/draft/glpapi09.c:602:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[50]; data/glpk-4.65/src/draft/glpapi09.c:608:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "none of"); data/glpk-4.65/src/draft/glpapi09.c:612:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "one of"); data/glpk-4.65/src/draft/glpapi09.c:614:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "all of"); data/glpk-4.65/src/draft/glpapi09.c:616:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%d of", nb); data/glpk-4.65/src/draft/glphbm.c:64:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char card[80+1]; data/glpk-4.65/src/draft/glphbm.c:88:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[255+1]; data/glpk-4.65/src/draft/glphbm.c:145:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char str[80+1]; data/glpk-4.65/src/draft/glphbm.c:147:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, dsa->card + pos, width), str[width] = '\0'; data/glpk-4.65/src/draft/glphbm.c:167:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[80+1]; data/glpk-4.65/src/draft/glphbm.c:249:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[80+1]; data/glpk-4.65/src/draft/glphbm.c:263:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, dsa->card + dsa->fmt_w * pos, dsa->fmt_w); data/glpk-4.65/src/draft/glphbm.c:288:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[80+1], *ptr; data/glpk-4.65/src/draft/glphbm.c:302:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, dsa->card + dsa->fmt_w * pos, dsa->fmt_w); data/glpk-4.65/src/draft/glphbm.c:341:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dsa->fp = fopen(dsa->fname, "r"); data/glpk-4.65/src/draft/glphbm.c:356:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hbm->title, dsa->card, 72), hbm->title[72] = '\0'; data/glpk-4.65/src/draft/glphbm.c:359:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hbm->key, dsa->card+72, 8), hbm->key[8] = '\0'; data/glpk-4.65/src/draft/glphbm.c:374:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hbm->mxtype, dsa->card, 3), hbm->mxtype[3] = '\0'; data/glpk-4.65/src/draft/glphbm.c:391:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hbm->ptrfmt, dsa->card, 16), hbm->ptrfmt[16] = '\0'; data/glpk-4.65/src/draft/glphbm.c:393:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hbm->indfmt, dsa->card+16, 16), hbm->indfmt[16] = '\0'; data/glpk-4.65/src/draft/glphbm.c:395:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hbm->valfmt, dsa->card+32, 20), hbm->valfmt[20] = '\0'; data/glpk-4.65/src/draft/glphbm.c:397:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hbm->rhsfmt, dsa->card+52, 20), hbm->rhsfmt[20] = '\0'; data/glpk-4.65/src/draft/glphbm.c:403:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(hbm->rhstyp, "???"); data/glpk-4.65/src/draft/glphbm.c:409:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hbm->rhstyp, dsa->card, 3), hbm->rhstyp[3] = '\0'; data/glpk-4.65/src/draft/glphbm.h:34:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[72+1]; data/glpk-4.65/src/draft/glphbm.h:36:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[8+1]; data/glpk-4.65/src/draft/glphbm.h:38:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mxtype[3+1]; data/glpk-4.65/src/draft/glphbm.h:50:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rhstyp[3+1]; data/glpk-4.65/src/draft/glphbm.h:56:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptrfmt[16+1]; data/glpk-4.65/src/draft/glphbm.h:58:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char indfmt[16+1]; data/glpk-4.65/src/draft/glphbm.h:60:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char valfmt[20+1]; data/glpk-4.65/src/draft/glphbm.h:62:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rhsfmt[20+1]; data/glpk-4.65/src/draft/glpios01.c:589:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(&tree->slot[1], &save[1], nslots * sizeof(IOSLOT)); data/glpk-4.65/src/draft/glpios01.c:1673:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(fn, T->save_sol, mark - T->save_sol); data/glpk-4.65/src/draft/glpios01.c:1675:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fn + strlen(fn), "%03d", ++(T->save_cnt)); data/glpk-4.65/src/draft/glpios03.c:56:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char best_mip[50], best_bound[50], *rho, rel_gap[50]; data/glpk-4.65/src/draft/glpios03.c:59:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(best_mip, "%17.9e", T->mip->mip_obj); data/glpk-4.65/src/draft/glpios03.c:77:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(best_bound, "%17.9e", temp); data/glpk-4.65/src/draft/glpios03.c:90:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(rel_gap, " 0.0%%"); data/glpk-4.65/src/draft/glpios03.c:92:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(rel_gap, "< 0.1%%"); data/glpk-4.65/src/draft/glpios03.c:94:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(rel_gap, "%5.1f%%", 100.0 * temp); data/glpk-4.65/src/draft/glpmat.c:298:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&S_ind[1], &temp[1], (S_ptr[ii] - 1) * sizeof(int)); data/glpk-4.65/src/draft/glpmat.c:303:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&S_ind[S_ptr[ii]], &ind[1], len * sizeof(int)); data/glpk-4.65/src/draft/glpmat.c:316:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&S_ind[1], &temp[1], size * sizeof(int)); data/glpk-4.65/src/draft/glpmat.c:658:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ind[1], &A_ind[A_ptr[k]], len * sizeof(int)); data/glpk-4.65/src/draft/glpmat.c:682:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&U_ind[1], &temp[1], (U_ptr[k] - 1) * sizeof(int)); data/glpk-4.65/src/draft/glpmat.c:687:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&U_ind[U_ptr[k]], &ind[1], len * sizeof(int)); data/glpk-4.65/src/draft/glpmat.c:707:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&U_ind[1], &temp[1], size * sizeof(int)); data/glpk-4.65/src/draft/glprgr.c:101:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(fname, "wb"); data/glpk-4.65/src/draft/glpspm.c:586:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(fname, "w"); data/glpk-4.65/src/env/dlsup.c:116:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char msg[20]; data/glpk-4.65/src/env/dlsup.c:117:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Error %d", GetLastError()); data/glpk-4.65/src/env/env.c:73:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(env->version, "%d.%d", data/glpk-4.65/src/env/env.h:48:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[7+1]; data/glpk-4.65/src/env/error.c:173:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(env->err_buf, msg, len); data/glpk-4.65/src/env/stdc.c:63:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { static TLS char s[1023+1]; data/glpk-4.65/src/env/stdc.c:86:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { static TLS char s[1023+1]; data/glpk-4.65/src/env/stdout.c:223:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). env->tee_file = fopen(name, "w"); data/glpk-4.65/src/env/stream.c:123:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { file = fopen(name, mode); data/glpk-4.65/src/env/stream.c:286:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)buf + nrd, f->ptr, cnt); data/glpk-4.65/src/env/stream.c:315:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { unsigned char buf[1]; data/glpk-4.65/src/env/stream.c:403:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f->ptr, (const char *)buf + nwr, cnt); data/glpk-4.65/src/env/stream.c:505:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(env->term_buf, "gzclose returned %d", errnum); data/glpk-4.65/src/intopt/spv.c:240:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x->ind[1], &y->ind[1], x->nnz * sizeof(int)); data/glpk-4.65/src/intopt/spv.c:241:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x->val[1], &y->val[1], x->nnz * sizeof(double)); data/glpk-4.65/src/misc/dimacs.h:43:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char field[255+1]; data/glpk-4.65/src/misc/ks.c:61:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[/*1+n*/]) data/glpk-4.65/src/misc/ks.c:63:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x_best[1+N_MAX]; data/glpk-4.65/src/misc/ks.c:80:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x_best[1], &x[1], n * sizeof(char)); data/glpk-4.65/src/misc/ks.c:92:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x[1], &x_best[1], n * sizeof(char)); data/glpk-4.65/src/misc/ks.c:154:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ks->a[1], &a[1], n * sizeof(int)); data/glpk-4.65/src/misc/ks.c:157:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ks->c[1], &c[1], n * sizeof(int)); data/glpk-4.65/src/misc/ks.c:364:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[/*1+n*/]) data/glpk-4.65/src/misc/ks.c:379:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x[1], &ks->x[1], n * sizeof(char)); data/glpk-4.65/src/misc/ks.c:437:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[/*1+n*/]) data/glpk-4.65/src/misc/ks.c:452:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x[1], &ks->x[1], n * sizeof(char)); data/glpk-4.65/src/misc/ks.h:29:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[/*1+n*/]); data/glpk-4.65/src/misc/ks.h:34:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[/*1+n*/]); data/glpk-4.65/src/misc/ks.h:39:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[/*1+n*/]); data/glpk-4.65/src/misc/mc13d.c:216:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void setup(int n, char a[1+50][1+50], int ip[], int icn[], int lenr[]); data/glpk-4.65/src/misc/mc13d.c:221:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[1+50][1+50], hold[1+100]; data/glpk-4.65/src/misc/mc13d.c:280:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void setup(int n, char a[1+50][1+50], int ip[], int icn[], int lenr[]) data/glpk-4.65/src/misc/mygmp.c:122:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ee->d, e->d, 12); data/glpk-4.65/src/misc/wclique1.c:210:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&c[1], &c_list[1], size * sizeof(int)); data/glpk-4.65/src/mpl/mpl.h:906:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LENGTH+1] /* not changed */ data/glpk-4.65/src/mpl/mpl.h:929:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LENGTH+1] /* modified */ data/glpk-4.65/src/mpl/mpl1.c:364:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mpl->image, ".."); data/glpk-4.65/src/mpl/mpl1.c:1177:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char func[15+1]; data/glpk-4.65/src/mpl/mpl1.c:1946:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[8]; data/glpk-4.65/src/mpl/mpl1.c:2321:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[8]; data/glpk-4.65/src/mpl/mpl1.c:2719:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[16]; data/glpk-4.65/src/mpl/mpl1.c:2839:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[8]; data/glpk-4.65/src/mpl/mpl1.c:2869:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[8]; data/glpk-4.65/src/mpl/mpl1.c:2908:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[8]; data/glpk-4.65/src/mpl/mpl1.c:3301:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[8]; data/glpk-4.65/src/mpl/mpl1.c:3571:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[8]; data/glpk-4.65/src/mpl/mpl1.c:3639:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opstr[8]; data/glpk-4.65/src/mpl/mpl1.c:3963:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:413:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LENGTH+1] /* not changed */ data/glpk-4.65/src/mpl/mpl3.c:452:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(tail->seg, str->seg, STRSEG_SIZE); data/glpk-4.65/src/mpl/mpl3.c:511:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LENGTH+1] /* modified */ data/glpk-4.65/src/mpl/mpl3.c:677:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl3.c:679:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char str[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:705:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (len == 255) strcpy(buf+252, "..."); data/glpk-4.65/src/mpl/mpl3.c:723:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char str1[MAX_LENGTH+1], str2[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:726:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str1, "%.*g", DBL_DIG, sym1->num); data/glpk-4.65/src/mpl/mpl3.c:730:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str2, "%.*g", DBL_DIG, sym2->num); data/glpk-4.65/src/mpl/mpl3.c:734:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char buf[255+1]; data/glpk-4.65/src/mpl/mpl3.c:944:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (len == 255) strcpy(buf+252, "..."); data/glpk-4.65/src/mpl/mpl3.c:2343:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char buf[255+1]; data/glpk-4.65/src/mpl/mpl3.c:2835:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[255+1]; data/glpk-4.65/src/mpl/mpl3.c:3797:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:3800:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl3.c:3809:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_LENGTH+1], fmt[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:3812:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl3.c:3818:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmt, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl3.c:3979:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:3982:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%.*g", DBL_DIG, value->num); data/glpk-4.65/src/mpl/mpl3.c:4014:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_LENGTH+1], fmt[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:4018:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmt, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl3.c:5045:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:5089:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:5118:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl3.c:5748:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { unsigned char buf[1]; data/glpk-4.65/src/mpl/mpl3.c:5758:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[OUTBUF_SIZE], *c; data/glpk-4.65/src/mpl/mpl3.c:5773:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[MAX_LENGTH+1], *c, *from, save; data/glpk-4.65/src/mpl/mpl3.c:5777:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmt, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl3.c:5842:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:5845:22: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "%.*g", DBL_DIG, eval_numeric(mpl, data/glpk-4.65/src/mpl/mpl3.c:5857:25: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl3.c:5914:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl3.c:5917:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fname, "%.*g", DBL_DIG, sym->num); data/glpk-4.65/src/mpl/mpl4.c:379:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[OUTBUF_SIZE], *c; data/glpk-4.65/src/mpl/mpl4.c:419:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[4095+1]; data/glpk-4.65/src/mpl/mpl4.c:455:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[4095+1]; data/glpk-4.65/src/mpl/mpl4.c:810:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "Unknown"); data/glpk-4.65/src/mpl/mpl4.c:885:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (len == 255) strcpy(name+252, "..."); data/glpk-4.65/src/mpl/mpl4.c:1115:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (len == 255) strcpy(name+252, "..."); data/glpk-4.65/src/mpl/mpl5.c:330:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LENGTH+1]; data/glpk-4.65/src/mpl/mpl5.c:354:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, week[weekday(j)-1], 3), buf[3] = '\0'; data/glpk-4.65/src/mpl/mpl5.c:362:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, moon[month-1], 3), buf[3] = '\0'; data/glpk-4.65/src/mpl/mpl5.c:370:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", year / 100); data/glpk-4.65/src/mpl/mpl5.c:374:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", day); data/glpk-4.65/src/mpl/mpl5.c:378:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d/%02d/%02d", month, day, year % 100); data/glpk-4.65/src/mpl/mpl5.c:383:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%2d", day); data/glpk-4.65/src/mpl/mpl5.c:387:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%04d-%02d-%02d", year, month, day); data/glpk-4.65/src/mpl/mpl5.c:402:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", iso % 100); data/glpk-4.65/src/mpl/mpl5.c:416:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%04d", iso); data/glpk-4.65/src/mpl/mpl5.c:421:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", hh); data/glpk-4.65/src/mpl/mpl5.c:426:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", data/glpk-4.65/src/mpl/mpl5.c:431:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%03d", data/glpk-4.65/src/mpl/mpl5.c:437:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%2d", hh); data/glpk-4.65/src/mpl/mpl5.c:442:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%2d", data/glpk-4.65/src/mpl/mpl5.c:447:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", month); data/glpk-4.65/src/mpl/mpl5.c:451:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", mm); data/glpk-4.65/src/mpl/mpl5.c:471:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d:%02d", hh, mm); data/glpk-4.65/src/mpl/mpl5.c:475:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", ss); data/glpk-4.65/src/mpl/mpl5.c:479:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d:%02d:%02d", hh, mm, ss); data/glpk-4.65/src/mpl/mpl5.c:484:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", weekday(j)); data/glpk-4.65/src/mpl/mpl5.c:500:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", (j + 7 - sun) / 7); data/glpk-4.65/src/mpl/mpl5.c:518:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", iso / 7 + 1); data/glpk-4.65/src/mpl/mpl5.c:523:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", weekday(j) % 7); data/glpk-4.65/src/mpl/mpl5.c:535:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", (j + 7 - mon) / 7); data/glpk-4.65/src/mpl/mpl5.c:540:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%02d", year % 100); data/glpk-4.65/src/mpl/mpl5.c:545:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%04d", year); data/glpk-4.65/src/mpl/mpl5.c:559:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+len, buf, strlen(buf)); data/glpk-4.65/src/mpl/mpl6.c:57:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char field[CSV_FDLEN_MAX+1]; data/glpk-4.65/src/mpl/mpl6.c:117:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(csv->field, "EOF"); data/glpk-4.65/src/mpl/mpl6.c:123:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(csv->field, "EOR"); data/glpk-4.65/src/mpl/mpl6.c:241:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). csv->fp = fopen(csv->fname, "r"); data/glpk-4.65/src/mpl/mpl6.c:289:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). csv->fp = fopen(csv->fname, "w"); data/glpk-4.65/src/mpl/mpl6.c:502:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[10+1]; data/glpk-4.65/src/mpl/mpl6.c:730:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbf->fp = fopen(dbf->fname, "rb"); data/glpk-4.65/src/mpl/mpl6.c:749:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbf->fp = fopen(dbf->fname, "wb"); data/glpk-4.65/src/mpl/mpl6.c:775:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[DBF_FDLEN_MAX+1]; data/glpk-4.65/src/mpl/mpl6.c:828:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[255+1]; data/glpk-4.65/src/mpl/mpl6.c:842:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(buf, "%.*g", DBL_DIG, mpl_tab_get_num(dca, k)); data/glpk-4.65/src/mpl/mpl6.c:867:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%*.*f", dbf->len[k], dbf->prec[k], num); data/glpk-4.65/src/mpl/mplsql.c:242:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (query, "SELECT "); data/glpk-4.65/src/mpl/mplsql.c:248:10: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(query, ", "); data/glpk-4.65/src/mpl/mplsql.c:250:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(query, " FROM "); data/glpk-4.65/src/mpl/mplsql.c:278:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (query, "INSERT INTO "); data/glpk-4.65/src/mpl/mplsql.c:280:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(query, " ( "); data/glpk-4.65/src/mpl/mplsql.c:286:10: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(query, ", "); data/glpk-4.65/src/mpl/mplsql.c:288:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(query, " ) VALUES ( "); data/glpk-4.65/src/mpl/mplsql.c:293:10: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(query, ", "); data/glpk-4.65/src/mpl/mplsql.c:295:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(query, " )"); data/glpk-4.65/src/mpl/mplsql.c:886:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SQL_FDLEN_MAX+1]; data/glpk-4.65/src/mpl/mplsql.c:937:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[50]; data/glpk-4.65/src/mpl/mplsql.c:979:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(num, "%-18g",mpl_tab_get_num(dca, k)); data/glpk-4.65/src/mpl/mplsql.c:981:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(num, "%.*g", DBL_DIG, mpl_tab_get_num(dca, k)); data/glpk-4.65/src/mpl/mplsql.c:1393:36: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = (unsigned int) atol(value); data/glpk-4.65/src/mpl/mplsql.c:1409:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { query = (char *) sqllines[j]; data/glpk-4.65/src/mpl/mplsql.c:1424:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. arg = (char *) sqllines[j]; data/glpk-4.65/src/mpl/mplsql.c:1496:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. arg = (char *) sqllines[j]; data/glpk-4.65/src/mpl/mplsql.c:1513:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[255+1]; data/glpk-4.65/src/mpl/mplsql.c:1543:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. strncpy(buf, (const char *) row[i-1], len); data/glpk-4.65/src/mpl/mplsql.c:1569:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[50]; data/glpk-4.65/src/mpl/mplsql.c:1611:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(num, "%-18g",mpl_tab_get_num(dca, k)); data/glpk-4.65/src/mpl/mplsql.c:1613:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(num, "%.*g", DBL_DIG, mpl_tab_get_num(dca, k)); data/glpk-4.65/src/proxy/main.c:48:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp=fopen(argv[2],"r"); data/glpk-4.65/src/proxy/main.c:49:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]={0x0}; data/glpk-4.65/src/simplex/spxlp.c:48:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ind[1], &lp->A_ind[ptr], len * sizeof(int)); data/glpk-4.65/src/simplex/spxlp.c:49:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&val[1], &lp->A_val[ptr], len * sizeof(double)); data/glpk-4.65/src/simplex/spxlp.c:106:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&y[1], &b[1], m * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:712:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->tcol.vec[1], &tcol[1], m * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:763:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->tcol[1], &tcol[1], m * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:765:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->tcol.vec[1], &tcol[1], m * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:778:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->tcol[1], &tcol[1], m * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:780:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->tcol.vec[1], &tcol[1], m * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:961:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(l, orig_l, (1+n) * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:962:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(u, orig_u, (1+n) * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:1207:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, csa->orig_c, (1+n) * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:1347:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, csa->orig_c, (1+n) * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:1590:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, csa->orig_c, (1+n) * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:1649:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csa->orig_c, csa->lp->c, (1+csa->lp->n) * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:1652:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csa->orig_l, csa->lp->l, (1+csa->lp->n) * sizeof(double)); data/glpk-4.65/src/simplex/spxprim.c:1654:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csa->orig_u, csa->lp->u, (1+csa->lp->n) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:308:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, csa->orig_b, (1+m) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:310:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(l, csa->orig_l, (1+n) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:311:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(u, csa->orig_u, (1+n) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:788:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->trow[1], &trow[1], (n-m) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:790:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->trow.vec[1], &trow[1], (n-m) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:817:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->trow[1], &trow[1], (n-m) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:819:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->trow.vec[1], &trow[1], (n-m) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:831:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->trow[1], &trow[1], (n-m) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:833:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&csa->trow.vec[1], &trow[1], (n-m) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:973:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, orig_c, (1+n) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:1879:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csa->orig_b, csa->lp->b, (1+csa->lp->m) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:1881:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csa->orig_c, csa->lp->c, (1+csa->lp->n) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:1883:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csa->orig_l, csa->lp->l, (1+csa->lp->n) * sizeof(double)); data/glpk-4.65/src/simplex/spydual.c:1885:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csa->orig_u, csa->lp->u, (1+csa->lp->n) * sizeof(double)); data/glpk-4.65/src/zlib/crc32.c:163:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen("crc32.h", "w"); data/glpk-4.65/src/zlib/gzlib.c:32:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1024]; data/glpk-4.65/src/zlib/gzlib.c:61:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "unknown win32 error (%ld)", error); data/glpk-4.65/src/zlib/gzlib.c:160:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open(path, data/glpk-4.65/src/zlib/gzlib.c:221:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(path, "<fd:%d>", fd); /* for debugging */ data/glpk-4.65/src/zlib/gzlib.c:515:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(state->msg, ": "); data/glpk-4.65/src/zlib/gzread.c:216:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->next + state->have, strm->next_in, strm->avail_in); data/glpk-4.65/src/zlib/gzread.c:405:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, state->next, n); data/glpk-4.65/src/zlib/gzread.c:457:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[1]; data/glpk-4.65/src/zlib/gzread.c:589:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, state->next, n); data/glpk-4.65/src/zlib/gzwrite.c:194:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(strm->next_in + strm->avail_in, buf, n); data/glpk-4.65/src/zlib/gzwrite.c:225:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[1]; data/glpk-4.65/src/zlib/inflate.c:607:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hbuf[4]; /* buffer for gzip header crc calculation */ data/glpk-4.65/src/zlib/inflate.c:1350:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[4]; /* to restore bit buffer to byte string */ data/glpk-4.65/src/zlib/trees.c:335:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *header = fopen("trees.h", "w"); data/glpk-4.65/src/zlib/zio.c:28:5: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int open(const char *path, int oflag, ...) data/glpk-4.65/src/zlib/zio.c:34:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path, "rb"); data/glpk-4.65/src/zlib/zio.c:36:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path, "wb"); data/glpk-4.65/src/zlib/zio.c:38:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path, "ab"); data/glpk-4.65/src/zlib/zio.h:20:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define open _glp_zlib_open data/glpk-4.65/src/zlib/zio.h:21:5: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int open(const char *path, int oflag, ...); data/glpk-4.65/src/zlib/zutil.c:14:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * const z_errmsg[10] = { data/glpk-4.65/src/zlib/zutil.h:32:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char * const z_errmsg[10]; data/glpk-4.65/src/zlib/zutil.h:59:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define zmemcpy memcpy data/glpk-4.65/examples/cplex/cplex.c:1968:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). beg = end = strlen(filename); data/glpk-4.65/examples/glpsol.c:1070:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += 1 + strlen(argv[k]); data/glpk-4.65/examples/threads/multiseed.c:67:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(text); data/glpk-4.65/examples/tsp/tsplib.c:55:16: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { csa->c = fgetc(csa->fp); data/glpk-4.65/examples/tsp/tsplib.c:174:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(csa->token) == 0) data/glpk-4.65/examples/tsp/tsplib.c:189:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(csa->token) == 0) data/glpk-4.65/examples/tsp/tsplib.c:241:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(csa->token) == 0) data/glpk-4.65/examples/tsp/tsplib.c:246:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tsp->name = xalloc(strlen(csa->token)+1, sizeof(char)); data/glpk-4.65/examples/tsp/tsplib.c:284:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { tsp->comment = xalloc(strlen(csa->token)+1, sizeof(char)); data/glpk-4.65/src/api/asnlp.c:86:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(name) < sizeof(name)); data/glpk-4.65/src/api/cplex.c:1157:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) + strlen(term) > 72) data/glpk-4.65/src/api/cplex.c:1157:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) + strlen(term) > 72) data/glpk-4.65/src/api/cplex.c:1190:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) + strlen(term) > 72) data/glpk-4.65/src/api/cplex.c:1190:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) + strlen(term) > 72) data/glpk-4.65/src/api/cplex.c:1197:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) + strlen(term) > 72) data/glpk-4.65/src/api/cplex.c:1197:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) + strlen(term) > 72) data/glpk-4.65/src/api/cplex.c:1215:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) + strlen(term) > 72) data/glpk-4.65/src/api/cplex.c:1215:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) + strlen(term) > 72) data/glpk-4.65/src/api/graph.c:105:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { dmp_free_atom(G->pool, G->name, strlen(G->name)+1); data/glpk-4.65/src/api/graph.c:117:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). G->name = dmp_get_atom(G->pool, strlen(name)+1); data/glpk-4.65/src/api/graph.c:203:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dmp_free_atom(G->pool, v->name, strlen(v->name)+1); data/glpk-4.65/src/api/graph.c:216:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->name = dmp_get_atom(G->pool, strlen(name)+1); data/glpk-4.65/src/api/graph.c:486:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(name == NULL || name[0] == '\0' || strlen(name) > 255)) data/glpk-4.65/src/api/maxflp.c:85:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(name) < sizeof(name)); data/glpk-4.65/src/api/mcflp.c:80:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(name) < sizeof(name)); data/glpk-4.65/src/api/mps.c:61:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(parm->obj_name == NULL || strlen(parm->obj_name) <= 255)) data/glpk-4.65/src/api/mps.c:166:1: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read: c = glp_getc(csa->fp); data/glpk-4.65/src/api/mps.c:185:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). goto read; data/glpk-4.65/src/api/mps.c:1115:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). { strncpy(csa->field, csa->P->name, 8); data/glpk-4.65/src/api/mps.c:1130:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). csa->deck && strlen(csa->P->row[i]->name) > 8) data/glpk-4.65/src/api/mps.c:1145:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). csa->deck && strlen(csa->P->col[j]->name) > 8) data/glpk-4.65/src/api/mps.c:1167:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(csa->field) <= 12) break; data/glpk-4.65/src/api/mps.c:1169:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(csa->field) <= 12); data/glpk-4.65/src/api/pript.c:67:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (row->name == NULL || strlen(row->name) <= 12) data/glpk-4.65/src/api/pript.c:97:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (col->name == NULL || strlen(col->name) <= 12) data/glpk-4.65/src/api/prmip.c:68:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (row->name == NULL || strlen(row->name) <= 12) data/glpk-4.65/src/api/prmip.c:94:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (col->name == NULL || strlen(col->name) <= 12) data/glpk-4.65/src/api/prob1.c:139:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { dmp_free_atom(lp->pool, lp->name, strlen(lp->name)+1); data/glpk-4.65/src/api/prob1.c:151:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lp->name = dmp_get_atom(lp->pool, strlen(name)+1); data/glpk-4.65/src/api/prob1.c:180:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { dmp_free_atom(lp->pool, lp->obj, strlen(lp->obj)+1); data/glpk-4.65/src/api/prob1.c:192:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lp->obj = dmp_get_atom(lp->pool, strlen(name)+1); data/glpk-4.65/src/api/prob1.c:442:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dmp_free_atom(lp->pool, row->name, strlen(row->name)+1); data/glpk-4.65/src/api/prob1.c:455:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). row->name = dmp_get_atom(lp->pool, strlen(name)+1); data/glpk-4.65/src/api/prob1.c:499:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dmp_free_atom(lp->pool, col->name, strlen(col->name)+1); data/glpk-4.65/src/api/prob1.c:512:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). col->name = dmp_get_atom(lp->pool, strlen(name)+1); data/glpk-4.65/src/api/prob3.c:97:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(name == NULL || name[0] == '\0' || strlen(name) > 255)) data/glpk-4.65/src/api/prob3.c:125:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(name == NULL || name[0] == '\0' || strlen(name) > 255)) data/glpk-4.65/src/api/prrngs.c:233:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name != NULL && strlen(name) > 12) data/glpk-4.65/src/api/prsol.c:69:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (row->name == NULL || strlen(row->name) <= 12) data/glpk-4.65/src/api/prsol.c:106:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (col->name == NULL || strlen(col->name) <= 12) data/glpk-4.65/src/api/wrcnf.c:62:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len > 0 && len + 1 + strlen(s) > 72) data/glpk-4.65/src/api/wrcnf.c:66:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(s); data/glpk-4.65/src/draft/glpapi09.c:349:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, ""); data/glpk-4.65/src/draft/glpapi09.c:610:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, ""); data/glpk-4.65/src/draft/glphbm.c:91:14: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). { c = fgetc(dsa->fp); data/glpk-4.65/src/draft/glphbm.c:321:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { xassert(strlen(str) < 80); data/glpk-4.65/src/draft/glphbm.c:322:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(ptr+1, ptr, strlen(ptr)+1); data/glpk-4.65/src/draft/glpios01.c:488:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { r->name = dmp_get_atom(tree->pool, strlen(name)+1); data/glpk-4.65/src/draft/glpios01.c:760:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dmp_free_atom(tree->pool, r->name, strlen(r->name)+1); data/glpk-4.65/src/draft/glpios01.c:1449:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cut->name = dmp_get_atom(tree->pool, strlen(name)+1); data/glpk-4.65/src/draft/glpios01.c:1572:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dmp_free_atom(tree->pool, cut->name, strlen(cut->name)+1); data/glpk-4.65/src/draft/glpios01.c:1621:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dmp_free_atom(tree->pool, cut->name, strlen(cut->name)+1); data/glpk-4.65/src/draft/glpios01.c:1668:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fn = talloc(strlen(T->save_sol) + 50, char); data/glpk-4.65/src/draft/glpios01.c:1675:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(fn + strlen(fn), "%03d", ++(T->save_cnt)); data/glpk-4.65/src/env/error.c:170:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(msg); data/glpk-4.65/src/env/stdout.c:84:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(env->term_buf) < TBUF_SIZE); data/glpk-4.65/src/env/stdout.c:114:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(env->term_buf) < TBUF_SIZE); data/glpk-4.65/src/mpl/mpl1.c:818:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arg.str = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:1236:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(func) < sizeof(func)); data/glpk-4.65/src/mpl/mpl1.c:1564:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:1753:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:1966:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:2325:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:2721:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(opstr, ""); data/glpk-4.65/src/mpl/mpl1.c:2748:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(opstr, " "); data/glpk-4.65/src/mpl/mpl1.c:2754:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:2842:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:2874:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:2913:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:2972:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). set->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:2987:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { set->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3217:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). par->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3233:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { par->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3321:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:3475:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). var->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3487:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { var->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3583:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:3669:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). con->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3682:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { con->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3726:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(opstr) < sizeof(opstr)); data/glpk-4.65/src/mpl/mpl1.c:3870:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). obj->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3883:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { obj->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3978:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tab->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:3983:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { tab->alias = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:4088:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fld->name = dmp_get_atomv(mpl->pool, strlen(mpl->image)+1); data/glpk-4.65/src/mpl/mpl1.c:4150:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(mpl->image) < sizeof(name)); data/glpk-4.65/src/mpl/mpl1.c:4156:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(in->par->name) < sizeof(name)); data/glpk-4.65/src/mpl/mpl1.c:4160:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). in->name = dmp_get_atomv(mpl->pool, strlen(name)+1); data/glpk-4.65/src/mpl/mpl1.c:4181:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { xassert(strlen(mpl->image) < sizeof(name)); data/glpk-4.65/src/mpl/mpl1.c:4198:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(mpl->image) < sizeof(name)); data/glpk-4.65/src/mpl/mpl1.c:4205:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). out->name = dmp_get_atomv(mpl->pool, strlen(name)+1); data/glpk-4.65/src/mpl/mpl3.c:419:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) <= MAX_LENGTH); data/glpk-4.65/src/mpl/mpl3.c:431:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) <= MAX_LENGTH); data/glpk-4.65/src/mpl/mpl3.c:432:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = dmp_get_atom(mpl->strings, strlen(buf)+1); data/glpk-4.65/src/mpl/mpl3.c:522:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). done: xassert(strlen(buf) <= MAX_LENGTH); data/glpk-4.65/src/mpl/mpl3.c:551:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { dmp_free_atom(mpl->strings, str, strlen(str)+1); data/glpk-4.65/src/mpl/mpl3.c:707:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) <= 255); data/glpk-4.65/src/mpl/mpl3.c:733:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str1) + strlen(str2) > MAX_LENGTH) data/glpk-4.65/src/mpl/mpl3.c:733:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str1) + strlen(str2) > MAX_LENGTH) data/glpk-4.65/src/mpl/mpl3.c:736:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:937:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(str) < sizeof(str)); data/glpk-4.65/src/mpl/mpl3.c:945:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) <= 255); data/glpk-4.65/src/mpl/mpl3.c:2345:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:2844:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:2853:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:2863:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:2873:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:2882:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:2892:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:3804:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). value = strlen(str); data/glpk-4.65/src/mpl/mpl3.c:3991:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (pos < 1 || pos > strlen(str) + 1) data/glpk-4.65/src/mpl/mpl3.c:4002:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (pos < 1 || len < 0 || pos + len > strlen(str) + 1) data/glpk-4.65/src/mpl/mpl3.c:5031:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(str) <= MAX_LENGTH); data/glpk-4.65/src/mpl/mpl3.c:5122:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dca->arg[k] = xmalloc(strlen(buf)+1); data/glpk-4.65/src/mpl/mpl3.c:5205:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(dca->str[k]) <= MAX_LENGTH); data/glpk-4.65/src/mpl/mpl3.c:5246:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(dca->str[k]) <= MAX_LENGTH); data/glpk-4.65/src/mpl/mpl3.c:5761:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl3.c:5850:25: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(value, "T"); data/glpk-4.65/src/mpl/mpl3.c:5852:25: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(value, "F"); data/glpk-4.65/src/mpl/mpl3.c:5933:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mpl->prt_file = xmalloc(strlen(fname)+1); data/glpk-4.65/src/mpl/mpl4.c:352:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mpl->out_file = xmalloc(strlen(file)+1); data/glpk-4.65/src/mpl/mpl4.c:382:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl4.c:422:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(msg) < sizeof(msg)); data/glpk-4.65/src/mpl/mpl4.c:458:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(msg) < sizeof(msg)); data/glpk-4.65/src/mpl/mpl4.c:627:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mpl->mod_file = xcalloc(strlen(file)+1, sizeof(char)); data/glpk-4.65/src/mpl/mpl4.c:813:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(name) <= 255); data/glpk-4.65/src/mpl/mpl4.c:877:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/glpk-4.65/src/mpl/mpl4.c:886:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(name) <= 255); data/glpk-4.65/src/mpl/mpl4.c:1107:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/glpk-4.65/src/mpl/mpl4.c:1116:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(name) <= 255); data/glpk-4.65/src/mpl/mpl5.c:556:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len + strlen(buf) > MAX_LENGTH) data/glpk-4.65/src/mpl/mpl5.c:559:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(str+len, buf, strlen(buf)); data/glpk-4.65/src/mpl/mpl5.c:560:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(buf); data/glpk-4.65/src/mpl/mpl6.c:78:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). loop: c = fgetc(csv->fp); data/glpk-4.65/src/mpl/mpl6.c:236:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). csv->fname = xmalloc(strlen(mpl_tab_get_arg(dca, 2))+1); data/glpk-4.65/src/mpl/mpl6.c:479:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). b = fgetc(dbf->fp); data/glpk-4.65/src/mpl/mpl6.c:726:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dbf->fname = xmalloc(strlen(mpl_tab_get_arg(dca, 2))+1); data/glpk-4.65/src/mpl/mpl6.c:849:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(str) > dbf->len[k]) data/glpk-4.65/src/mpl/mpl6.c:868:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xassert(strlen(buf) < sizeof(buf)); data/glpk-4.65/src/mpl/mpl6.c:869:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(buf) != dbf->len[k]) goto err; data/glpk-4.65/src/mpl/mplsql.c:102:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:116:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:129:16: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(sqllines[i], " "); data/glpk-4.65/src/mpl/mplsql.c:132:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(sqllines[i]); data/glpk-4.65/src/mpl/mplsql.c:192:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). remaining = strlen(from); data/glpk-4.65/src/mpl/mplsql.c:236:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total += strlen(field); data/glpk-4.65/src/mpl/mplsql.c:240:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total += strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:272:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total += strlen(field); data/glpk-4.65/src/mpl/mplsql.c:276:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total += strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:291:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(query, "?"); data/glpk-4.65/src/mpl/mplsql.c:799:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total = strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:802:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total = strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:869:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total = strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:921:16: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, (const char *) sql->data[i], len); data/glpk-4.65/src/mpl/mplsql.c:946:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(sql->query); data/glpk-4.65/src/mpl/mplsql.c:986:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( query, "'"); data/glpk-4.65/src/mpl/mplsql.c:987:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). db_escape_string( query + strlen(query), data/glpk-4.65/src/mpl/mplsql.c:989:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( query, "'"); data/glpk-4.65/src/mpl/mplsql.c:1358:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(dsn); data/glpk-4.65/src/mpl/mplsql.c:1425:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total = strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:1428:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total = strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:1499:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total = strlen(arg); data/glpk-4.65/src/mpl/mplsql.c:1543:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, (const char *) row[i-1], len); data/glpk-4.65/src/mpl/mplsql.c:1578:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(sql->query); data/glpk-4.65/src/mpl/mplsql.c:1618:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( query, "'"); data/glpk-4.65/src/mpl/mplsql.c:1619:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). db_escape_string( query + strlen(query), data/glpk-4.65/src/mpl/mplsql.c:1621:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( query, "'"); data/glpk-4.65/src/npp/npp1.c:286:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dmp_free_atom(npp->pool, row->name, strlen(row->name)+1); data/glpk-4.65/src/npp/npp1.c:313:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dmp_free_atom(npp->pool, col->name, strlen(col->name)+1); data/glpk-4.65/src/npp/npp1.c:377:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { npp->name = dmp_get_atom(npp->pool, strlen(orig->name)+1); data/glpk-4.65/src/npp/npp1.c:381:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { npp->obj = dmp_get_atom(npp->pool, strlen(orig->obj)+1); data/glpk-4.65/src/npp/npp1.c:393:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { row->name = dmp_get_atom(npp->pool, strlen(rrr->name)+1); data/glpk-4.65/src/npp/npp1.c:434:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { col->name = dmp_get_atom(npp->pool, strlen(ccc->name)+1); data/glpk-4.65/src/zlib/gzlib.c:151:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). state->path = malloc(strlen(path) + 1); data/glpk-4.65/src/zlib/gzlib.c:509:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((state->msg = malloc(strlen(state->path) + strlen(msg) + 3)) == NULL) { data/glpk-4.65/src/zlib/gzlib.c:509:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((state->msg = malloc(strlen(state->path) + strlen(msg) + 3)) == NULL) { data/glpk-4.65/src/zlib/gzread.c:31:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ret = read(state->fd, buf + *have, len - *have); data/glpk-4.65/src/zlib/gzwrite.c:272:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (unsigned)strlen(str); data/glpk-4.65/src/zlib/gzwrite.c:331:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(state->in); data/glpk-4.65/src/zlib/gzwrite.c:405:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(state->in); data/glpk-4.65/src/zlib/zio.c:50:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). long read(int fd, void *buf, unsigned long nbyte) data/glpk-4.65/src/zlib/zio.h:23:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define read _glp_zlib_read data/glpk-4.65/src/zlib/zio.h:24:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). long read(int fd, void *buf, unsigned long nbyte); ANALYSIS SUMMARY: Hits = 835 Lines analyzed = 132302 in approximately 4.03 seconds (32869 lines/second) Physical Source Lines of Code (SLOC) = 82444 Hits@level = [0] 107 [1] 193 [2] 456 [3] 13 [4] 173 [5] 0 Hits@level+ = [0+] 942 [1+] 835 [2+] 642 [3+] 186 [4+] 173 [5+] 0 Hits/KSLOC@level+ = [0+] 11.4259 [1+] 10.1281 [2+] 7.7871 [3+] 2.25608 [4+] 2.09839 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.