Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/gst-rtsp-server1.0-1.18.1/examples/test-appsrc.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-appsrc2.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-auth-digest.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-auth.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-cgroups.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-launch.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-mp4.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-multicast.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-multicast2.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-netclock-client.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-netclock.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-ogg.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-onvif-backchannel.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-onvif-client.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-onvif-server.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-onvif-server.h Examining data/gst-rtsp-server1.0-1.18.1/examples/test-readme.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-record-auth.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-record.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-sdp.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-uri.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-video-disconnect.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-video-rtx.c Examining data/gst-rtsp-server1.0-1.18.1/examples/test-video.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-context.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-context.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-latency-bin.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-latency-bin.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media-factory-uri.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media-factory-uri.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media-factory.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media-factory.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-mount-points.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-mount-points.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-client.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-client.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-media-factory.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-media-factory.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-media.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-media.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-server.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-onvif-server.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-params.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-params.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-permissions.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-permissions.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-sdp.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-sdp.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server-internal.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server-object.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server-prelude.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-media.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-media.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-pool.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-pool.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream-transport.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream-transport.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-thread-pool.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-thread-pool.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-token.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-token.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.c Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.h Examining data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/plugin.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/addresspool.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/media.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/mediafactory.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/mountpoints.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/onvif.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/permissions.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspclientsink.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/sessionmedia.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/sessionpool.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/stream.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/threadpool.c Examining data/gst-rtsp-server1.0-1.18.1/tests/check/gst/token.c Examining data/gst-rtsp-server1.0-1.18.1/tests/test-cleanup.c Examining data/gst-rtsp-server1.0-1.18.1/tests/test-reuse.c FINAL RESULTS: data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:679:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf (gst_sdp_media_get_format (sdp_media, 0), "%" G_GINT32_FORMAT, data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:693:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf (gst_sdp_media_get_format (sdp_media, 0), "%" G_GINT32_FORMAT, data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c:917:38: [3] (random) g_random_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. g_strdup_printf ("%08x%08x", g_random_int (), g_random_int ()); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c:917:55: [3] (random) g_random_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. g_strdup_printf ("%08x%08x", g_random_int (), g_random_int ()); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3137:32: [3] (random) g_random_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. session_id_tmp = (((guint64) g_random_int ()) << 32) | g_random_int (); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3137:58: [3] (random) g_random_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. session_id_tmp = (((guint64) g_random_int ()) << 32) | g_random_int (); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-pool.c:324:28: [3] (random) g_random_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. session_id_charset[g_random_int_range (0, data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.c:4393:36: [3] (random) g_random_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. sess_id = g_strdup_printf ("%u", g_random_int ()); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:2286:36: [3] (random) g_random_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. sess_id = g_strdup_printf ("%u", g_random_int ()); data/gst-rtsp-server1.0-1.18.1/examples/test-netclock-client.c:105:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clock_port = atoi (argv[3]); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.c:237:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (addr->bytes, g_inet_address_to_bytes (inet), addr->size); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.c:374:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (temp->max.bytes, temp->min.bytes, temp->min.size); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-address-pool.c:390:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (range->max.bytes, range->min.bytes, range->min.size); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-media.c:4367:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pt = atoi (gst_sdp_media_get_format (sdp_media, j)); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-server.c:886:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = atoi (priv->service); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream.c:2313:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = atoi (tmp + 1); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c:86:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fail_unless (atoi (str) == cseq++); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c:451:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fail_unless (atoi (str) == cseq++); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c:564:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fail_unless (atoi (str) == cseq++); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/client.c:636:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fail_unless (atoi (str) == cseq++); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/onvif.c:489:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fail_unless (atoi (str) == cseq++); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspclientsink.c:82:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). test_port = atoi (service); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:191:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). test_port = atoi (service); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:225:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). test_port = atoi (service); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:260:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). test_port = atoi (service); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:1942:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). test_port = atoi (service); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:2550:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). test_port = atoi (service); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:2649:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). test_port = atoi (service); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c:639:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (strv[2]) != 32) { data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-auth.c:1226:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = g_base64_encode ((guchar *) user_pass, strlen (user_pass)); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:957:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (path1) != len2) data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:994:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_len = strlen (path); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:1526:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (size == 0 || !data || strlen ((char *) data) == 0) { data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:1584:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (size == 0 || !data || strlen ((char *) data) == 0) { data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:1762:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trail = (path[strlen (path) - 1] != '/' ? "/" : ""); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3246:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gst_rtsp_message_take_body (ctx->response, (guint8 *) str, strlen (str)); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3733:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (uri->abspath); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-client.c:3846:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (sig_result) == 0) data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-mount-points.c:249:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). item.len = strlen (path); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-mount-points.c:352:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). item = data_item_new (g_strdup (path), strlen (path), factory); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-media.c:157:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). priv->path_len = strlen (path); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-session-media.c:191:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (path); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-server/rtsp-stream.c:5996:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (str); data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.c:4002:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen (transports) == 0) { data/gst-rtsp-server1.0-1.18.1/gst/rtsp-sink/gstrtspclientsink.c:4446:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gst_rtsp_message_take_body (&request, (guint8 *) str, strlen (str)); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:435:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (*body, (gchar *) response->body, response->body_size); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:527:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (body), sdp_message) == GST_SDP_OK); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/rtspserver.c:2207:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gst_rtsp_message_take_body (request, (guint8 *) str, strlen (str)); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/sessionmedia.c:70:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fail_unless (match_len == strlen (TEST_PATH)); data/gst-rtsp-server1.0-1.18.1/tests/check/gst/sessionmedia.c:212:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fail_unless (match_len == strlen (TEST_PATH)); ANALYSIS SUMMARY: Hits = 50 Lines analyzed = 54130 in approximately 1.12 seconds (48464 lines/second) Physical Source Lines of Code (SLOC) = 35221 Hits@level = [0] 4 [1] 22 [2] 19 [3] 7 [4] 2 [5] 0 Hits@level+ = [0+] 54 [1+] 50 [2+] 28 [3+] 9 [4+] 2 [5+] 0 Hits/KSLOC@level+ = [0+] 1.53318 [1+] 1.41961 [2+] 0.79498 [3+] 0.255529 [4+] 0.0567843 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.