Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-appsrc.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-appsrc2.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-auth-digest.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-auth.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-cgroups.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-launch.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-mp4.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-multicast.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-multicast2.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-netclock-client.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-netclock.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-ogg.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-onvif-backchannel.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-onvif-client.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-onvif-server.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-onvif-server.h
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-readme.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-record-auth.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-record.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-sdp.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-uri.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-video-disconnect.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-video-rtx.c
Examining data/gst-rtsp-server1.0-1.18.1/examples/test-video.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-context.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-context.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-latency-bin.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-latency-bin.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media-factory-uri.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media-factory-uri.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media-factory.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media-factory.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-mount-points.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-mount-points.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-client.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-client.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-media-factory.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-media-factory.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-media.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-media.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-server.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-server.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-params.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-params.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-permissions.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-permissions.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-sdp.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-sdp.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server-internal.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server-object.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server-prelude.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-media.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-media.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-pool.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-pool.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream-transport.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream-transport.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-thread-pool.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-thread-pool.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-token.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-token.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.c
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.h
Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/plugin.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/addresspool.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/media.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/mediafactory.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/mountpoints.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/onvif.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/permissions.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspclientsink.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/sessionmedia.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/sessionpool.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/stream.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/threadpool.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/token.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/test-cleanup.c
Examining data/gst-rtsp-server1.0-1.18.1/tests/test-reuse.c

FINAL RESULTS:

data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:679:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf (gst_sdp_media_get_format (sdp_media, 0), "%" G_GINT32_FORMAT,
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:693:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  sscanf (gst_sdp_media_get_format (sdp_media, 0), "%" G_GINT32_FORMAT,
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c:917:38:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        g_strdup_printf ("%08x%08x", g_random_int (), g_random_int ());
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c:917:55:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        g_strdup_printf ("%08x%08x", g_random_int (), g_random_int ());
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3137:32:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  session_id_tmp = (((guint64) g_random_int ()) << 32) | g_random_int ();
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3137:58:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  session_id_tmp = (((guint64) g_random_int ()) << 32) | g_random_int ();
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-pool.c:324:28:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        session_id_charset[g_random_int_range (0,
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.c:4393:36:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  sess_id = g_strdup_printf ("%u", g_random_int ());
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:2286:36:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  sess_id = g_strdup_printf ("%u", g_random_int ());
data/gst-rtsp-server1.0-1.18.1/examples/test-netclock-client.c:105:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  clock_port = atoi (argv[3]);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.c:237:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (addr->bytes, g_inet_address_to_bytes (inet), addr->size);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.c:374:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (temp->max.bytes, temp->min.bytes, temp->min.size);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.c:390:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (range->max.bytes, range->min.bytes, range->min.size);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media.c:4367:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      pt = atoi (gst_sdp_media_get_format (sdp_media, j));
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server.c:886:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  port = atoi (priv->service);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream.c:2313:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  port = atoi (tmp + 1);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c:86:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  fail_unless (atoi (str) == cseq++);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c:451:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  fail_unless (atoi (str) == cseq++);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c:564:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  fail_unless (atoi (str) == cseq++);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c:636:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  fail_unless (atoi (str) == cseq++);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/onvif.c:489:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  fail_unless (atoi (str) == cseq++);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspclientsink.c:82:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  test_port = atoi (service);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:191:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  test_port = atoi (service);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:225:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  test_port = atoi (service);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:260:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  test_port = atoi (service);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:1942:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  test_port = atoi (service);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:2550:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  test_port = atoi (service);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:2649:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  test_port = atoi (service);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c:639:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen (strv[2]) != 32) {
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c:1226:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result = g_base64_encode ((guchar *) user_pass, strlen (user_pass));
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:957:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (path1) != len2)
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:994:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_len = strlen (path);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:1526:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (size == 0 || !data || strlen ((char *) data) == 0) {
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:1584:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (size == 0 || !data || strlen ((char *) data) == 0) {
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:1762:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  trail = (path[strlen (path) - 1] != '/' ? "/" : "");
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3246:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  gst_rtsp_message_take_body (ctx->response, (guint8 *) str, strlen (str));
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3733:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (uri->abspath);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3846:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (sig_result) == 0)
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-mount-points.c:249:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  item.len = strlen (path);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-mount-points.c:352:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  item = data_item_new (g_strdup (path), strlen (path), factory);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-media.c:157:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  priv->path_len = strlen (path);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-media.c:191:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (path);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream.c:5996:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen (str);
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.c:4002:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen (transports) == 0) {
data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.c:4446:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  gst_rtsp_message_take_body (&request, (guint8 *) str, strlen (str));
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:435:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy (*body, (gchar *) response->body, response->body_size);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:527:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen (body), sdp_message) == GST_SDP_OK);
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:2207:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  gst_rtsp_message_take_body (request, (guint8 *) str, strlen (str));
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/sessionmedia.c:70:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fail_unless (match_len == strlen (TEST_PATH));
data/gst-rtsp-server1.0-1.18.1/tests/check/gst/sessionmedia.c:212:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fail_unless (match_len == strlen (TEST_PATH));

ANALYSIS SUMMARY:

Hits = 50
Lines analyzed = 54130 in approximately 1.12 seconds (48464 lines/second)
Physical Source Lines of Code (SLOC) = 35221
Hits@level = [0]   4 [1]  22 [2]  19 [3]   7 [4]   2 [5]   0
Hits@level+ = [0+]  54 [1+]  50 [2+]  28 [3+]   9 [4+]   2 [5+]   0
Hits/KSLOC@level+ = [0+] 1.53318 [1+] 1.41961 [2+] 0.79498 [3+] 0.255529 [4+] 0.0567843 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.