Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_types.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/includes.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/types.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/includes.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/definitions.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_main.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.h Examining data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_types.h Examining data/ion-3.2.1+dfsg/bp/ltp/ltpcla.h Examining data/ion-3.2.1+dfsg/bp/ltp/ltpcli.c Examining data/ion-3.2.1+dfsg/bp/ltp/ltpclo.c Examining data/ion-3.2.1+dfsg/bp/udp/libudpcla.c Examining data/ion-3.2.1+dfsg/bp/udp/udpclo.c Examining data/ion-3.2.1+dfsg/bp/udp/udpcli.c Examining data/ion-3.2.1+dfsg/bp/udp/udpcla.h Examining data/ion-3.2.1+dfsg/bp/cgr/libcgr.c Examining data/ion-3.2.1+dfsg/bp/library/bpP.h Examining data/ion-3.2.1+dfsg/bp/library/libbp.c Examining data/ion-3.2.1+dfsg/bp/library/libbpnm.c Examining data/ion-3.2.1+dfsg/bp/library/bei.h Examining data/ion-3.2.1+dfsg/bp/library/bei.c Examining data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.h Examining data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.c Examining data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.h Examining data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c Examining data/ion-3.2.1+dfsg/bp/library/ext/ecos/ecos.c Examining data/ion-3.2.1+dfsg/bp/library/ext/ecos/ecos.h Examining data/ion-3.2.1+dfsg/bp/library/ext/bpextensions.c Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppib.c Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.h Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.h Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.h Examining data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppib.h Examining data/ion-3.2.1+dfsg/bp/library/ext/phn/phn.h Examining data/ion-3.2.1+dfsg/bp/library/ext/phn/phn.c Examining data/ion-3.2.1+dfsg/bp/library/ext/noextensions.c Examining data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c Examining data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.h Examining data/ion-3.2.1+dfsg/bp/library/cgr.h Examining data/ion-3.2.1+dfsg/bp/library/libbpP.c Examining data/ion-3.2.1+dfsg/bp/library/acs/acstx.c Examining data/ion-3.2.1+dfsg/bp/library/acs/acsid.c Examining data/ion-3.2.1+dfsg/bp/library/acs/acsrx.c Examining data/ion-3.2.1+dfsg/bp/library/acs/acsappend.c Examining data/ion-3.2.1+dfsg/bp/library/acs/acsserialize.c Examining data/ion-3.2.1+dfsg/bp/library/acs/acs.h Examining data/ion-3.2.1+dfsg/bp/library/acs/acsP.h Examining data/ion-3.2.1+dfsg/bp/library/bpnm.h Examining data/ion-3.2.1+dfsg/bp/dccp/dccpcla.h Examining data/ion-3.2.1+dfsg/bp/dccp/dccpcli.c Examining data/ion-3.2.1+dfsg/bp/dccp/dccpclo.c Examining data/ion-3.2.1+dfsg/bp/include/bp.h Examining data/ion-3.2.1+dfsg/bp/test/bpsource.c Examining data/ion-3.2.1+dfsg/bp/test/bpchat.c Examining data/ion-3.2.1+dfsg/bp/test/bpsink.c Examining data/ion-3.2.1+dfsg/bp/test/bping.c Examining data/ion-3.2.1+dfsg/bp/test/bpstats2.c Examining data/ion-3.2.1+dfsg/bp/test/bpcounter.c Examining data/ion-3.2.1+dfsg/bp/test/bpdriver.c Examining data/ion-3.2.1+dfsg/bp/test/bpnmtest.c Examining data/ion-3.2.1+dfsg/bp/test/bpecho.c Examining data/ion-3.2.1+dfsg/bp/brs/brscla.h Examining data/ion-3.2.1+dfsg/bp/brs/brsscla.c Examining data/ion-3.2.1+dfsg/bp/brs/brsccla.c Examining data/ion-3.2.1+dfsg/bp/daemon/bpclock.c Examining data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c Examining data/ion-3.2.1+dfsg/bp/utils/acslist.c Examining data/ion-3.2.1+dfsg/bp/utils/bptrace.c Examining data/ion-3.2.1+dfsg/bp/utils/bpadmin.c Examining data/ion-3.2.1+dfsg/bp/utils/lgsend.c Examining data/ion-3.2.1+dfsg/bp/utils/lgagent.c Examining data/ion-3.2.1+dfsg/bp/utils/bprecvfile.c Examining data/ion-3.2.1+dfsg/bp/utils/bplist.c Examining data/ion-3.2.1+dfsg/bp/utils/bpcancel.c Examining data/ion-3.2.1+dfsg/bp/utils/acsadmin.c Examining data/ion-3.2.1+dfsg/bp/utils/bpstats.c Examining data/ion-3.2.1+dfsg/bp/utils/bpsendfile.c Examining data/ion-3.2.1+dfsg/bp/utils/hmackeys.c Examining data/ion-3.2.1+dfsg/bp/bssp/bsspclo.c Examining data/ion-3.2.1+dfsg/bp/bssp/bsspcli.c Examining data/ion-3.2.1+dfsg/bp/bssp/bsspcla.h Examining data/ion-3.2.1+dfsg/bp/dgr/dgrcla.c Examining data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c Examining data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c Examining data/ion-3.2.1+dfsg/bp/ipn/ipnfw.h Examining data/ion-3.2.1+dfsg/bp/ipn/ipnadminep.c Examining data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c Examining data/ion-3.2.1+dfsg/bp/imc/imcP.h Examining data/ion-3.2.1+dfsg/bp/imc/imcfw.h Examining data/ion-3.2.1+dfsg/bp/imc/imcfw.c Examining data/ion-3.2.1+dfsg/bp/imc/imcadmin.c Examining data/ion-3.2.1+dfsg/bp/imc/libimcfw.c Examining data/ion-3.2.1+dfsg/bp/tcp/tcpcli.c Examining data/ion-3.2.1+dfsg/bp/tcp/stcpclo.c Examining data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c Examining data/ion-3.2.1+dfsg/bp/tcp/stcpcli.c Examining data/ion-3.2.1+dfsg/bp/tcp/tcpclo.c Examining data/ion-3.2.1+dfsg/bp/tcp/tcpcla.h Examining data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c Examining data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c Examining data/ion-3.2.1+dfsg/bp/dtn2/dtn2adminep.c Examining data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c Examining data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.h Examining data/ion-3.2.1+dfsg/ltp/udp/udplsi.c Examining data/ion-3.2.1+dfsg/ltp/udp/udplso.c Examining data/ion-3.2.1+dfsg/ltp/udp/udplsa.h Examining data/ion-3.2.1+dfsg/ltp/sda/libsda.c Examining data/ion-3.2.1+dfsg/ltp/library/ltpei.h Examining data/ion-3.2.1+dfsg/ltp/library/ltpP.h Examining data/ion-3.2.1+dfsg/ltp/library/ext/ltpextensions.c Examining data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c Examining data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.h Examining data/ion-3.2.1+dfsg/ltp/library/libltpnm.c Examining data/ion-3.2.1+dfsg/ltp/library/ltpei.c Examining data/ion-3.2.1+dfsg/ltp/library/libltp.c Examining data/ion-3.2.1+dfsg/ltp/library/ltpnm.h Examining data/ion-3.2.1+dfsg/ltp/library/libltpP.c Examining data/ion-3.2.1+dfsg/ltp/dccp/dccplso.c Examining data/ion-3.2.1+dfsg/ltp/dccp/dccplsi.c Examining data/ion-3.2.1+dfsg/ltp/dccp/dccplsa.h Examining data/ion-3.2.1+dfsg/ltp/include/sda.h Examining data/ion-3.2.1+dfsg/ltp/include/ltp.h Examining data/ion-3.2.1+dfsg/ltp/aos/aoslsi.c Examining data/ion-3.2.1+dfsg/ltp/aos/aoslso.c Examining data/ion-3.2.1+dfsg/ltp/aos/aoslsa.h Examining data/ion-3.2.1+dfsg/ltp/test/sdatest.c Examining data/ion-3.2.1+dfsg/ltp/test/ltpdriver.c Examining data/ion-3.2.1+dfsg/ltp/test/ltpcounter.c Examining data/ion-3.2.1+dfsg/ltp/daemon/ltpclock.c Examining data/ion-3.2.1+dfsg/ltp/daemon/ltpmeter.c Examining data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c Examining data/ion-3.2.1+dfsg/arch-android/iondtn/jni/gov_nasa_jpl_iondtn_NodeAdministrator.h Examining data/ion-3.2.1+dfsg/arch-android/iondtn/jni/mysymtab.c Examining data/ion-3.2.1+dfsg/arch-android/iondtn/jni/iondtn.c Examining data/ion-3.2.1+dfsg/arch-android/iondtn/jni/gdslogger.c Examining data/ion-3.2.1+dfsg/bss/library/libbss.c Examining data/ion-3.2.1+dfsg/bss/library/libbssP.c Examining data/ion-3.2.1+dfsg/bss/library/bssP.h Examining data/ion-3.2.1+dfsg/bss/include/bss.h Examining data/ion-3.2.1+dfsg/bss/test/bssdriver.c Examining data/ion-3.2.1+dfsg/bss/test/bssrecv.c Examining data/ion-3.2.1+dfsg/bss/test/bsscounter.c Examining data/ion-3.2.1+dfsg/bss/test/bssStreamingApp.c Examining data/ion-3.2.1+dfsg/bss/test/bsstest.h Examining data/ion-3.2.1+dfsg/cfdp/bp/bputa.c Examining data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c Examining data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h Examining data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c Examining data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c Examining data/ion-3.2.1+dfsg/cfdp/include/cfdpops.h Examining data/ion-3.2.1+dfsg/cfdp/include/cfdp.h Examining data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c Examining data/ion-3.2.1+dfsg/cfdp/daemon/cfdpclock.c Examining data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c Examining data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h Examining data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c Examining data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c Examining data/ion-3.2.1+dfsg/restart/utils/ionrestart.c Examining data/ion-3.2.1+dfsg/ici/sdr/sdrstring.c Examining data/ion-3.2.1+dfsg/ici/sdr/sdrtable.c Examining data/ion-3.2.1+dfsg/ici/sdr/sdrhash.c Examining data/ion-3.2.1+dfsg/ici/sdr/sdrmgt.c Examining data/ion-3.2.1+dfsg/ici/sdr/sdrP.h Examining data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c Examining data/ion-3.2.1+dfsg/ici/sdr/sdrlist.c Examining data/ion-3.2.1+dfsg/ici/sdr/sdrcatlg.c Examining data/ion-3.2.1+dfsg/ici/library/rfx.c Examining data/ion-3.2.1+dfsg/ici/library/lyst.c Examining data/ion-3.2.1+dfsg/ici/library/memmgr.c Examining data/ion-3.2.1+dfsg/ici/library/symtab.c Examining data/ion-3.2.1+dfsg/ici/library/smlist.c Examining data/ion-3.2.1+dfsg/ici/library/sptrace.c Examining data/ion-3.2.1+dfsg/ici/library/ionsec.c Examining data/ion-3.2.1+dfsg/ici/library/lystP.h Examining data/ion-3.2.1+dfsg/ici/library/smrbt.c Examining data/ion-3.2.1+dfsg/ici/library/llcv.c Examining data/ion-3.2.1+dfsg/ici/library/platform_sm.c Examining data/ion-3.2.1+dfsg/ici/library/zco.c Examining data/ion-3.2.1+dfsg/ici/library/platform.c Examining data/ion-3.2.1+dfsg/ici/library/ion.c Examining data/ion-3.2.1+dfsg/ici/library/psm.c Examining data/ion-3.2.1+dfsg/ici/library/libicinm.c Examining data/ion-3.2.1+dfsg/ici/library/icinm.h Examining data/ion-3.2.1+dfsg/ici/include/lyst.h Examining data/ion-3.2.1+dfsg/ici/include/psm.h Examining data/ion-3.2.1+dfsg/ici/include/sdrmgt.h Examining data/ion-3.2.1+dfsg/ici/include/crypto.h Examining data/ion-3.2.1+dfsg/ici/include/sdrhash.h Examining data/ion-3.2.1+dfsg/ici/include/sdrlist.h Examining data/ion-3.2.1+dfsg/ici/include/sdrstring.h Examining data/ion-3.2.1+dfsg/ici/include/ionsec.h Examining data/ion-3.2.1+dfsg/ici/include/sdrtable.h Examining data/ion-3.2.1+dfsg/ici/include/sptrace.h Examining data/ion-3.2.1+dfsg/ici/include/rfx.h Examining data/ion-3.2.1+dfsg/ici/include/smlist.h Examining data/ion-3.2.1+dfsg/ici/include/platform_sm.h Examining data/ion-3.2.1+dfsg/ici/include/llcv.h Examining data/ion-3.2.1+dfsg/ici/include/smrbt.h Examining data/ion-3.2.1+dfsg/ici/include/sdrxn.h Examining data/ion-3.2.1+dfsg/ici/include/sdr.h Examining data/ion-3.2.1+dfsg/ici/include/zco.h Examining data/ion-3.2.1+dfsg/ici/include/memmgr.h Examining data/ion-3.2.1+dfsg/ici/include/platform.h Examining data/ion-3.2.1+dfsg/ici/include/ion.h Examining data/ion-3.2.1+dfsg/ici/include/icinm.h Examining data/ion-3.2.1+dfsg/ici/test/sm2file.c Examining data/ion-3.2.1+dfsg/ici/test/sdr2file.c Examining data/ion-3.2.1+dfsg/ici/test/smlistsh.c Examining data/ion-3.2.1+dfsg/ici/test/psmshell.c Examining data/ion-3.2.1+dfsg/ici/test/owlttb.c Examining data/ion-3.2.1+dfsg/ici/test/file2sm.c Examining data/ion-3.2.1+dfsg/ici/test/file2sdr.h Examining data/ion-3.2.1+dfsg/ici/test/smrbtsh.c Examining data/ion-3.2.1+dfsg/ici/test/owltsim.c Examining data/ion-3.2.1+dfsg/ici/test/file2sdr.c Examining data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c Examining data/ion-3.2.1+dfsg/ici/crypto/sample_crypto.h Examining data/ion-3.2.1+dfsg/ici/daemon/rfxclock.c Examining data/ion-3.2.1+dfsg/ici/daemon/winion.c Examining data/ion-3.2.1+dfsg/ici/utils/sdrwatch.c Examining data/ion-3.2.1+dfsg/ici/utils/ionexit.c Examining data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c Examining data/ion-3.2.1+dfsg/ici/utils/sdrmend.c Examining data/ion-3.2.1+dfsg/ici/utils/psmwatch.c Examining data/ion-3.2.1+dfsg/ici/utils/ionwarn.c Examining data/ion-3.2.1+dfsg/ici/utils/killm.c Examining data/ion-3.2.1+dfsg/ici/utils/ionadmin.c Examining data/ion-3.2.1+dfsg/dtpc/library/dtpcP.h Examining data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c Examining data/ion-3.2.1+dfsg/dtpc/library/libdtpc.c Examining data/ion-3.2.1+dfsg/dtpc/include/dtpc.h Examining data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c Examining data/ion-3.2.1+dfsg/dtpc/test/dtpcreceive.c Examining data/ion-3.2.1+dfsg/dtpc/daemon/dtpcd.c Examining data/ion-3.2.1+dfsg/dtpc/daemon/dtpcclock.c Examining data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c Examining data/ion-3.2.1+dfsg/tests/1400.loopback-stcp/dotest.c Examining data/ion-3.2.1+dfsg/tests/1300.loopback-tcp/dotest.c Examining data/ion-3.2.1+dfsg/tests/1000.loopback/dotest.c Examining data/ion-3.2.1+dfsg/tests/bug-0015-tcpclo-bpcp-sig-handling/test.c Examining data/ion-3.2.1+dfsg/tests/issue-279-bpMemo-timeline/driver.c Examining data/ion-3.2.1+dfsg/tests/library/check.h Examining data/ion-3.2.1+dfsg/tests/library/check.c Examining data/ion-3.2.1+dfsg/tests/library/ionstop.c Examining data/ion-3.2.1+dfsg/tests/library/ionstart.c Examining data/ion-3.2.1+dfsg/tests/library/testutil.h Examining data/ion-3.2.1+dfsg/tests/library/paths.c Examining data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c Examining data/ion-3.2.1+dfsg/tests/issue-260-teach-valgrind-mtake/domtake.c Examining data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c Examining data/ion-3.2.1+dfsg/tests/issue-188-common-cos-syntax/dotest.c Examining data/ion-3.2.1+dfsg/tests/1500.loopback-brs/dotest.c Examining data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c Examining data/ion-3.2.1+dfsg/arch-rtems/pmqlsi.c Examining data/ion-3.2.1+dfsg/arch-rtems/pmqlsa.h Examining data/ion-3.2.1+dfsg/arch-rtems/mysymtab.c Examining data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c Examining data/ion-3.2.1+dfsg/arch-rtems/pmqlso.c Examining data/ion-3.2.1+dfsg/arch-rtems/gdslogger.c Examining data/ion-3.2.1+dfsg/bssp/udp/udpbsa.h Examining data/ion-3.2.1+dfsg/bssp/udp/udpbsi.c Examining data/ion-3.2.1+dfsg/bssp/udp/udpbso.c Examining data/ion-3.2.1+dfsg/bssp/library/libbssp.c Examining data/ion-3.2.1+dfsg/bssp/library/libbsspP.c Examining data/ion-3.2.1+dfsg/bssp/library/bsspP.h Examining data/ion-3.2.1+dfsg/bssp/include/bssp.h Examining data/ion-3.2.1+dfsg/bssp/daemon/bsspclock.c Examining data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c Examining data/ion-3.2.1+dfsg/bssp/tcp/libtcpbsa.c Examining data/ion-3.2.1+dfsg/bssp/tcp/tcpbso.c Examining data/ion-3.2.1+dfsg/bssp/tcp/tcpbsi.c Examining data/ion-3.2.1+dfsg/bssp/tcp/tcpbsa.h Examining data/ion-3.2.1+dfsg/dgr/library/libdgr.c Examining data/ion-3.2.1+dfsg/dgr/include/dgr.h Examining data/ion-3.2.1+dfsg/dgr/test/file2tcp.h Examining data/ion-3.2.1+dfsg/dgr/test/file2dgr.c Examining data/ion-3.2.1+dfsg/dgr/test/udp2file.c Examining data/ion-3.2.1+dfsg/dgr/test/tcp2file.c Examining data/ion-3.2.1+dfsg/dgr/test/file2tcp.c Examining data/ion-3.2.1+dfsg/dgr/test/file2udp.h Examining data/ion-3.2.1+dfsg/dgr/test/file2udp.c Examining data/ion-3.2.1+dfsg/dgr/test/file2dgr.h Examining data/ion-3.2.1+dfsg/dgr/test/dgr2file.c Examining data/ion-3.2.1+dfsg/ams/rams/librams.c Examining data/ion-3.2.1+dfsg/ams/rams/ramsgate.c Examining data/ion-3.2.1+dfsg/ams/rams/ramscommon.h Examining data/ion-3.2.1+dfsg/ams/rams/rams.h Examining data/ion-3.2.1+dfsg/ams/rams/ramscommon.c Examining data/ion-3.2.1+dfsg/ams/library/loadmib.c Examining data/ion-3.2.1+dfsg/ams/library/udpts.c Examining data/ion-3.2.1+dfsg/ams/library/amsP.h Examining data/ion-3.2.1+dfsg/ams/library/tcpts.c Examining data/ion-3.2.1+dfsg/ams/library/vmqts.c Examining data/ion-3.2.1+dfsg/ams/library/amsd.c Examining data/ion-3.2.1+dfsg/ams/library/amscommon.h Examining data/ion-3.2.1+dfsg/ams/library/crypt.c Examining data/ion-3.2.1+dfsg/ams/library/libams.c Examining data/ion-3.2.1+dfsg/ams/library/amscommon.c Examining data/ion-3.2.1+dfsg/ams/library/dgrts.c Examining data/ion-3.2.1+dfsg/ams/library/default.marshal.c Examining data/ion-3.2.1+dfsg/ams/library/default.crypt.c Examining data/ion-3.2.1+dfsg/ams/library/marshal.c Examining data/ion-3.2.1+dfsg/ams/include/ams.h Examining data/ion-3.2.1+dfsg/ams/test/amspubsub.c Examining data/ion-3.2.1+dfsg/ams/test/amslog.c Examining data/ion-3.2.1+dfsg/ams/test/amslogprt.c Examining data/ion-3.2.1+dfsg/ams/test/amsbenchs.c Examining data/ion-3.2.1+dfsg/ams/test/amshello.c Examining data/ion-3.2.1+dfsg/ams/test/amsbenchr.c Examining data/ion-3.2.1+dfsg/ams/test/amsshell.c Examining data/ion-3.2.1+dfsg/ams/utils/amsmib.c Examining data/ion-3.2.1+dfsg/ams/utils/amsstop.c Examining data/ion-3.2.1+dfsg/nm/shared/primitives/instr.c Examining data/ion-3.2.1+dfsg/nm/shared/primitives/def.c Examining data/ion-3.2.1+dfsg/nm/shared/primitives/report.h Examining data/ion-3.2.1+dfsg/nm/shared/primitives/admin.h Examining data/ion-3.2.1+dfsg/nm/shared/primitives/def.h Examining data/ion-3.2.1+dfsg/nm/shared/primitives/instr.h Examining data/ion-3.2.1+dfsg/nm/shared/primitives/report.c Examining data/ion-3.2.1+dfsg/nm/shared/primitives/rules.c Examining data/ion-3.2.1+dfsg/nm/shared/primitives/admin.c Examining data/ion-3.2.1+dfsg/nm/shared/primitives/mid.h Examining data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c Examining data/ion-3.2.1+dfsg/nm/shared/primitives/oid.h Examining data/ion-3.2.1+dfsg/nm/shared/primitives/rules.h Examining data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c Examining data/ion-3.2.1+dfsg/nm/shared/utils/db.c Examining data/ion-3.2.1+dfsg/nm/shared/utils/nm_types.h Examining data/ion-3.2.1+dfsg/nm/shared/utils/expr.h Examining data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.c Examining data/ion-3.2.1+dfsg/nm/shared/utils/db.h Examining data/ion-3.2.1+dfsg/nm/shared/utils/debug.h Examining data/ion-3.2.1+dfsg/nm/shared/utils/expr.c Examining data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.h Examining data/ion-3.2.1+dfsg/nm/shared/utils/utils.h Examining data/ion-3.2.1+dfsg/nm/shared/utils/utils.c Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.h Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_ltp.c Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm.h Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_ltp.h Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_agent.h Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_agent.c Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.h Examining data/ion-3.2.1+dfsg/nm/shared/adm/adm.c Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_def.c Examining data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_def.h Examining data/ion-3.2.1+dfsg/nm/shared/msg/pdu.h Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.h Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.h Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.h Examining data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c Examining data/ion-3.2.1+dfsg/nm/agent/ldc.c Examining data/ion-3.2.1+dfsg/nm/agent/ldc.h Examining data/ion-3.2.1+dfsg/nm/agent/lcc.c Examining data/ion-3.2.1+dfsg/nm/agent/adm_agent_priv.h Examining data/ion-3.2.1+dfsg/nm/agent/nmagent.c Examining data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c Examining data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c Examining data/ion-3.2.1+dfsg/nm/agent/ingest.h Examining data/ion-3.2.1+dfsg/nm/agent/nmagent.h Examining data/ion-3.2.1+dfsg/nm/agent/lcc.h Examining data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.h Examining data/ion-3.2.1+dfsg/nm/agent/rda.h Examining data/ion-3.2.1+dfsg/nm/agent/ingest.c Examining data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.h Examining data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.h Examining data/ion-3.2.1+dfsg/nm/agent/adm_agent_priv.c Examining data/ion-3.2.1+dfsg/nm/agent/rda.c Examining data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr.h Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr.c Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.h Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.h Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_rx.c Examining data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c FINAL RESULTS: data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c:29:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(text, args); data/ion-3.2.1+dfsg/bp/library/acs/acsP.h:204:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(acsLogBuf, sizeof(acsLogBuf), args); \ data/ion-3.2.1+dfsg/bp/library/acs/acstx.c:80:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( text, "ION parms pathname : %s", pathname ); data/ion-3.2.1+dfsg/bp/library/libbpP.c:2060:6: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(metaEid->nss, UVAST_FIELDSPEC ".%u", &(metaEid->nodeNbr), data/ion-3.2.1+dfsg/bp/test/bpchat.c:154:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, usage); data/ion-3.2.1+dfsg/bp/test/bping.c:417:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, usage); data/ion-3.2.1+dfsg/bp/test/bping.c:442:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, usage); data/ion-3.2.1+dfsg/bp/test/bpstats2.c:233:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, usage); data/ion-3.2.1+dfsg/bp/utils/acslist.c:21:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(acslistBuf, sizeof(acslistBuf), args); \ data/ion-3.2.1+dfsg/bp/utils/acslist.c:26:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(args); \ data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:164:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, cgr_tracepoint_text(traceType), args); data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:547:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(f, data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:597:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. ret = system("dot -Tsvg '" GRAPHVIZ_FILENAME "' | base64 -w 0 " data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1576:6: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, args); data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:84:6: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (system("rm dirlist_* >/dev/null 2>/dev/null")<0) data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:191:6: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, args); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.c:31:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (system(find_dtnd) == 0) data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.c:33:12: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. else if (system(find_ion) == 0) data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:77:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(eidString, "%s:%lu", data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:79:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(eidString, "%s.%lu", data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:97:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(eidString,"%s://%s.dtn%s",DTN2SCHEMENAME,hostname,service_tag); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:114:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(eidString, "%s:%lu", data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:116:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(eidString, "%s.%lu", data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:135:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(eidString,"%s://%s.dtn%s",DTN2SCHEMENAME,hostname,service_tag); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:335:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp_eid,dlv.bundleSourceEid); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:355:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename,"/tmp/ion%s_%u_%u",tmp, data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:288:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(payload.filename.filename_val,filename); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:31:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s;", eid.uri); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:70:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf1, buf2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:76:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf1, buf2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:82:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf1, buf2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:88:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf1, buf2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:94:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf1, buf2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:106:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf1, al_bp_status_report_reason_to_str(status_report.reason)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:130:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, string); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:189:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(client_demux_string, "%s_%d", CLI_EP_STRING, getpid()); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:194:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(perf_opt->dest_eid, SERV_EP_STRING); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:242:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp,local_eid.uri); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:244:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(temp,"%s.%s",ptr,MON_EP_NUM_SERVICE); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:252:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(perf_opt->mon_eid, MON_EP_STRING); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:285:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(temp1, "%s_%d", mon_eid.uri, mon_params.client_id); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:287:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(temp1, "%s", mon_eid.uri); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:302:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mon_eid.uri, temp1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:477:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp1, perf_opt->F_arg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:478:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp2, basename(temp1)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:480:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(transfer_filename, temp2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:828:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(source_file, "%s_%d_%d", SOURCE_FILE, getpid(),num_bundle); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:830:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(source_file, "%s_%d", SOURCE_FILE, getpid()); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1028:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(source_file, "%s_%d_%d", SOURCE_FILE, getpid(),sent_bundles); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1035:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file_bundle_names[sent_bundles], bundle.payload->filename.filename_val); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:102:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(command, "mkdir -p %s", perf_opt->logs_dir); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:109:6: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (system(command) < 0) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:145:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(temp, "%s_%d", MON_EP_STRING, parameters->client_id); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:147:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(temp, "%s", MON_EP_STRING); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:416:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, strtok(NULL, "\0")); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:422:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, strtok(NULL, "/")); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:430:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(full_filename, "%s/%s", perf_opt->logs_dir, filename); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:831:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cmd, "%s %s", argv[0], MONITOR_STRING); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:148:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(command, "mkdir -p %s", perf_opt->dest_dir); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:155:6: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (system(command) < 0) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:169:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(command, "mkdir -p %s", perf_opt->file_dir); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:176:6: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (system(command) < 0) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:680:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp_eid,bundle_source_addr.uri); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:693:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename_ack,"%s_%s_%d",SOURCE_FILE_ACK,tmp,num_ack); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:895:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, item->info->full_dir); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:896:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, item->info->filename); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1092:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cmd, "%s %s", argv[0], SERVER_STRING); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1149:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, item->info->full_dir); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1150:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, item->info->filename); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:186:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, info->full_dir); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:187:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, info->filename); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:283:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(full_dir, "%s%s/", dir, eid); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:284:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(temp, "mkdir -p %s", full_dir); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:285:6: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if(system(temp)<0){ data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:290:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full_dir, temp); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:308:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp, s); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:353:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buffer, home); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:354:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buffer, dir + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:377:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd_args, strchr(cmd, ' ')); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:378:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmd_exe, get_exe_name(strtok(cmd, " "))); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:401:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cmdline_file, "/proc/%s/cmdline", item->d_name); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:436:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmdline_args, cmdline_args_ptr != NULL ? cmdline_args_ptr : ""); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:437:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cmdline_exe, get_exe_name(strtok(cmdline, " "))); data/ion-3.2.1+dfsg/ici/library/ion.c:480:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(lineBuf, UVAST_FIELDSPEC " %d %31s %255s", data/ion-3.2.1+dfsg/ici/library/ion.c:1400:10: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. count = sscanf(timestampBuffer, timestampInFormat, &ts.tm_year, data/ion-3.2.1+dfsg/ici/library/platform.c:505:9: [4] (misc) cuserid: Exactly what cuserid() does is poorly defined (e.g., some systems use the effective uid, like Linux, while others like System V use the real uid). Thus, you can't trust what it does. It's certainly not portable (The cuserid function was included in the 1988 version of POSIX, but removed from the 1990 version). Also, if passed a non-null parameter, there's a risk of a buffer overflow if the passed-in buffer is not at least L_cuserid characters long (CWE-120). Use getpwuid(geteuid()) and extract the desired information instead. return cuserid(buffer); data/ion-3.2.1+dfsg/ici/library/platform.c:2666:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer + stringLength, fmt, sval); data/ion-3.2.1+dfsg/ici/library/platform.c:2688:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(scratchpad, fmt, llval); data/ion-3.2.1+dfsg/ici/library/platform.c:2693:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(scratchpad, fmt, ival); data/ion-3.2.1+dfsg/ici/library/platform.c:2704:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(scratchpad, fmt, dval); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:3090:3: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp(name, name, arg1, arg2, arg3, arg4, arg5, arg6, data/ion-3.2.1+dfsg/nm/agent/ingest.c:482:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ctrl->desc.sender.name, meta->senderEid.name); data/ion-3.2.1+dfsg/nm/agent/ingest.c:558:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_rule->desc.sender.name, meta->senderEid.name); data/ion-3.2.1+dfsg/nm/agent/nmagent.c:942:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *) manager_eid.name, argv[2]); data/ion-3.2.1+dfsg/nm/agent/nmagent.c:943:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *) agent_eid.name, argv[1]); data/ion-3.2.1+dfsg/nm/agent/rda.c:155:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rx.name,recipient); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr.c:587:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *) manager_eid.name, argv[1]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:74:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(query, "INSERT INTO dbtRegisteredAgents(AgentId) " data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:149:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(query, data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:178:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(query, data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:835:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(query, data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1662:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(query,"INSERT INTO dbtIncomingMessages(IncomingID,Content)" data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:291:2: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line,"%d %s", &offset, mid_str); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:359:2: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line,"%ld %d %d %s", &offset, &period, &evals, mid_str); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:428:2: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line,"%ld %d %d %s", &offset, &period, &evals, mid_str); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:503:2: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line,"%s", mid_str); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:571:2: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line,"%s", mid_str); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:651:6: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line,"%s", mid_str); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:696:2: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(line, "%s", agent_eid.name); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:989:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(result,"%s", (char*) buffer); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1069:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cursor += sprintf(cursor, "%s, ",buf_ptr); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:220:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(temp, 256, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:236:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(temp, 256, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:246:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(temp, 256, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:258:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(temp, 256, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:268:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(temp, 256, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:283:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(temp, 256, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:295:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(temp, 256, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:323:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(temp, 256, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:371:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(temp, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:380:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(result,temp); data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:150:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cursor, "inducts: %s\noutducts: %s\n",inducts, outducts); data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:216:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(result, data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:254:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(result, data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:872:13: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. cursor += sprintf(cursor,UVAST_FIELDSPEC"\n",mid->issuer); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:879:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cursor += sprintf(cursor,"OID : %s", oid_str); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:884:13: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. cursor += sprintf(cursor,UVAST_FIELDSPEC"\n",mid->tag); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:891:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cursor += sprintf(cursor,"RAW : %s", raw_str); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1460:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cursor += sprintf(cursor,"%s\n",mid_strs[i]); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1580:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cursor += sprintf(cursor,"%s ",mid_strs[i]); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:964:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cursor += sprintf(cursor, "Parm %d:%s\n",i,str); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:970:12: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. cursor += printf(cursor, "value_size: %d\n", oid->value_size); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:973:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cursor += sprintf(cursor, "value: %s\n---------------------\n\n", str); data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.c:263:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(meta->senderEid.name, dlv.bundleSourceEid); data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.c:264:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(meta->originatorEid.name, dlv.bundleSourceEid); data/ion-3.2.1+dfsg/nm/shared/utils/ion_if.c:265:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(meta->recipientEid.name, iif->local_eid.name); data/ion-3.2.1+dfsg/tests/library/check.c:27:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, msg, ap); data/ion-3.2.1+dfsg/bp/tcp/stcpcli.c:368:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tcpDelayString = getenv("TCP_DELAY_NSEC_PER_BYTE"); data/ion-3.2.1+dfsg/bp/tcp/tcpcli.c:569:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tcpDelayString = getenv("TCP_DELAY_NSEC_PER_BYTE"); data/ion-3.2.1+dfsg/bp/test/bpdriver.c:145:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int) time(NULL)); data/ion-3.2.1+dfsg/bp/test/bping.c:408:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "+c:i:hp:q:r:s:t:v")) != EOF) { data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:827:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt(argc, argv, "hqjt:e:s:mo:p:n:")) >= 0) data/ion-3.2.1+dfsg/bp/utils/hmackeys.c:67:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:499:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:834:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/ion-3.2.1+dfsg/bssp/tcp/tcpbsi.c:404:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tcpDelayString = getenv("TCP_DELAY_NSEC_PER_BYTE"); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:359:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. corruptionModulusString = getenv("CFDP_CORRUPTION_MODULUS"); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:167:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "dqrL:C:S:v")) != -1) data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:45:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "dv")) != -1) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1600:7: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt_long(argc, argv, "hvMCW:d:m:i:T:D:F:P:l:R:p:NrfL::", long_options, &option_index); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:740:8: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt_long(argc, argv, "hvao:s", long_options, &option_index); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:969:7: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt_long(argc, argv, "hvMl:p:ao:s", long_options, &option_index); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:352:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char * home = getenv("HOME"); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:144:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int) time(NULL)); data/ion-3.2.1+dfsg/ici/library/ion.c:402:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. nodeListDir = getenv("ION_NODE_LIST_DIR"); data/ion-3.2.1+dfsg/ici/library/ion.c:1074:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. wdname = getenv("ION_NODE_WDNAME"); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2847:6: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if (CreateProcess(NULL, cmdLine, NULL, NULL, FALSE, 0, NULL, NULL, data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2847:6: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if (CreateProcess(NULL, cmdLine, NULL, NULL, FALSE, 0, NULL, NULL, data/ion-3.2.1+dfsg/ici/test/owltsim.c:332:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/ion-3.2.1+dfsg/ici/test/smrbtsh.c:155:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:520:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL) * sm_TaskIdSelf()); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:827:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL) * sm_TaskIdSelf()); data/ion-3.2.1+dfsg/tests/library/paths.c:14:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char * cfgroot = getenv("CONFIGSROOT"); data/ion-3.2.1+dfsg/ams/library/amscommon.c:514:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mib->csPublicKeyName, pubkeyname, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:522:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mib->csPrivateKeyName, privkeyname, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1157:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(subj->symmetricKeyName, symmetricKeyName, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1165:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(subj->marshalFnName, marshalFnName, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1173:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(subj->unmarshalFnName, unmarshalFnName, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1214:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(role->publicKeyName, publicKeyName, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1222:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(role->privateKeyName, privateKeyName, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1381:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(app->publicKeyName, publicKeyName, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1389:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(app->privateKeyName, privateKeyName, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1406:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gwEidBuffer[MAX_GW_EID + 1]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1437:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msgspace->symmetricKeyName, symmetricKeyName, length); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1655:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gwEidBuffer[MAX_GW_EID + 1]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1827:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endpointName[MAX_EP_NAME + 1]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1908:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) amsesPtr, &amses, sizeof(AmsEpspec)); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1985:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(endpoint->ept, ept, eptLength); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2059:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char authKey[32]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:2063:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char authenticator[AUTHENTICAT_LEN]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:2068:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char timeTag[5]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:2101:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(authenticator, (char *) &nonce, 4);/* Clear. */ data/ion-3.2.1+dfsg/ams/library/amscommon.c:2102:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(authenticator + 4, (char *) &nonce, 4); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2128:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(timeTag + 1, (char *) &u4, 4); /* Coarse time. */ data/ion-3.2.1+dfsg/ams/library/amscommon.c:2149:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg + 2, (char *) &u2, 2); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2154:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg + 6, (char *) &u2, 2); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2156:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg + 8, (char *) &u4, 4); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2157:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg + 12, timeTag, 5); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2163:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg + 17, authenticator, authenticatorLength); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2170:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg + 17 + authenticatorLength, supplement, data/ion-3.2.1+dfsg/ams/library/amscommon.c:2179:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg + (msgLength -2), (char *) &checksum, 2); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2280:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char authKey[32]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:2283:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nonce[4]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:2346:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &checksum, msgBuffer + (length - 2), 2); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2359:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, msgBuffer + 2, 2); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2371:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, msgBuffer + 6, 2); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2409:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nonce, authenticator, 4); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2424:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u4, msgBuffer + 8, 4); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2431:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg.supplement, supplement, msg.supplementLength); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2441:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(evt->value, (char *) &msg, sizeof(MamsMsg)); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2476:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(evt->value, text, textLength); data/ion-3.2.1+dfsg/ams/library/amscommon.h:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[1]; data/ion-3.2.1+dfsg/ams/library/amscommon.h:237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char epspec[MAX_EP_SPEC + 1]; data/ion-3.2.1+dfsg/ams/library/amsd.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char undeclaredModules[MAX_MODULE_NBR + 1]; data/ion-3.2.1+dfsg/ams/library/amsd.c:767:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(evt->value, (char *) &msg, sizeof msg); data/ion-3.2.1+dfsg/ams/library/amsd.c:862:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char moduleLyst[MAX_MODULE_NBR + 1]; data/ion-3.2.1+dfsg/ams/library/amsd.c:1788:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ventureName[MAX_APP_NAME + 2 + MAX_AUTH_NAME + 1]; data/ion-3.2.1+dfsg/ams/library/amsd.c:2038:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ams/library/amsd.c:2039:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eps[MAXHOSTNAMELEN + 5 + 1]; data/ion-3.2.1+dfsg/ams/library/crypt.c:22:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cyphertext, plaintext, ptlen); data/ion-3.2.1+dfsg/ams/library/crypt.c:35:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(plaintext, cyphertext, ctlen); data/ion-3.2.1+dfsg/ams/library/crypt.c:48:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cyphertext, plaintext, ptlen); data/ion-3.2.1+dfsg/ams/library/crypt.c:61:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(plaintext, cyphertext, ctlen); data/ion-3.2.1+dfsg/ams/library/crypt.c:93:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*plaintext, cyphertext, ctlen); data/ion-3.2.1+dfsg/ams/library/default.crypt.c:22:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cyphertext, plaintext, ptlen); data/ion-3.2.1+dfsg/ams/library/default.crypt.c:35:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(plaintext, cyphertext, ctlen); data/ion-3.2.1+dfsg/ams/library/default.crypt.c:48:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cyphertext, plaintext, ptlen); data/ion-3.2.1+dfsg/ams/library/default.crypt.c:61:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(plaintext, cyphertext, ctlen); data/ion-3.2.1+dfsg/ams/library/default.crypt.c:93:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*plaintext, cyphertext, ctlen); data/ion-3.2.1+dfsg/ams/library/dgrts.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endpointNameText[32]; data/ion-3.2.1+dfsg/ams/library/dgrts.c:164:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endpointNameText[32]; data/ion-3.2.1+dfsg/ams/library/dgrts.c:283:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) (ep->tsep), (char *) &tsep, sizeof(DgrTsep)); data/ion-3.2.1+dfsg/ams/library/dgrts.c:313:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) (dp->tsep), (char *) &tsep, sizeof(DgrTsep)); data/ion-3.2.1+dfsg/ams/library/dgrts.c:415:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dgrAmsBuf, header, headerLen); data/ion-3.2.1+dfsg/ams/library/dgrts.c:418:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dgrAmsBuf + headerLen, content, contentLen); data/ion-3.2.1+dfsg/ams/library/dgrts.c:424:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dgrAmsBuf + headerLen + contentLen, (char *) &checksum, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:199:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(evt->value, text, textLength); data/ion-3.2.1+dfsg/ams/library/libams.c:517:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &checksum, msgBuffer + (length - 2), 2); data/ion-3.2.1+dfsg/ams/library/libams.c:565:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyBuffer[512]; data/ion-3.2.1+dfsg/ams/library/libams.c:585:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newContent, msg->content, msg->contentLength); data/ion-3.2.1+dfsg/ams/library/libams.c:649:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAXPATHLEN]; data/ion-3.2.1+dfsg/ams/library/libams.c:743:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &msg.subjectNbr, msgBuffer + 12, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:849:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &msg.contextNbr, msgBuffer + 8, 4); data/ion-3.2.1+dfsg/ams/library/libams.c:888:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(evt->value, (char *) &msg, sizeof(AmsMsg)); data/ion-3.2.1+dfsg/ams/library/libams.c:927:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyBuffer[512]; data/ion-3.2.1+dfsg/ams/library/libams.c:948:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header + 8, (char *) &context, 4); data/ion-3.2.1+dfsg/ams/library/libams.c:950:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header + 12, (char *) &i2, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:1002:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newContent, *content, *contentLength); data/ion-3.2.1+dfsg/ams/library/libams.c:1061:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(evt->value, (char *) &msg, sizeof msg); data/ion-3.2.1+dfsg/ams/library/libams.c:1092:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*cursor, (char *) &subjectNbr, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:1098:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*cursor, (char *) &unitNbr, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:1118:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, (char *) &i2, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:1133:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, (char *) &i2, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:1211:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, tsif->ts->name, len); data/ion-3.2.1+dfsg/ams/library/libams.c:1216:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, tsif->ept, len); data/ion-3.2.1+dfsg/ams/library/libams.c:1255:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(supplement, (char *) &moduleStatesCount, 4); data/ion-3.2.1+dfsg/ams/library/libams.c:1499:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(evt->value, (char *) ¬ice, sizeof notice); data/ion-3.2.1+dfsg/ams/library/libams.c:1828:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &i2, *cursor, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:1839:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, *cursor, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:1939:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, cursor, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:1965:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, cursor, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:2119:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ep->ept, ept, eptLength); data/ion-3.2.1+dfsg/ams/library/libams.c:2452:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u4, msg->supplement, 4); data/ion-3.2.1+dfsg/ams/library/libams.c:2465:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, cursor, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:2560:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &i2, msg->supplement, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:2565:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, msg->supplement + 4, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:2692:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u4, msg->supplement, 4); data/ion-3.2.1+dfsg/ams/library/libams.c:2705:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, cursor, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:2796:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &i2, msg->supplement, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:2801:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &u2, msg->supplement + 4, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:3028:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char modules[MAX_MODULE_NBR]; data/ion-3.2.1+dfsg/ams/library/libams.c:3076:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, modules, moduleCount); data/ion-3.2.1+dfsg/ams/library/libams.c:3680:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ventureName[MAX_APP_NAME + 2 + MAX_AUTH_NAME + 1]; data/ion-3.2.1+dfsg/ams/library/libams.c:4477:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char amsHeader[16]; data/ion-3.2.1+dfsg/ams/library/libams.c:4842:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cancellation, (char *) &i2, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:4847:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cancellation + 4, (char *) &u2, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:4898:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(envelope + 8, (unsigned char *) &i2, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:4904:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(envelope + 12, enclosureHdr, enclosureHdrLength); data/ion-3.2.1+dfsg/ams/library/libams.c:4905:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(envelope + 12 + enclosureHdrLength, enclosureContent, data/ion-3.2.1+dfsg/ams/library/libams.c:5034:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cancellation, (char *) &i2, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:5040:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cancellation + 4, (char *) &u2, 2); data/ion-3.2.1+dfsg/ams/library/libams.c:5105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char amsHeader[16]; data/ion-3.2.1+dfsg/ams/library/libams.c:5771:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char amsHeader[16]; data/ion-3.2.1+dfsg/ams/library/libams.c:6005:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, (char *) &code, sizeof(int)); data/ion-3.2.1+dfsg/ams/library/libams.c:6007:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, (char *) &dataLength, sizeof(int)); data/ion-3.2.1+dfsg/ams/library/libams.c:6011:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, data, dataLength); data/ion-3.2.1+dfsg/ams/library/libams.c:6370:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) code, event->value, sizeof(int)); data/ion-3.2.1+dfsg/ams/library/libams.c:6371:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) dataLength, event->value + sizeof(int), sizeof(int)); data/ion-3.2.1+dfsg/ams/library/libams.c:6423:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(sap->eventMgtRules), rules, sizeof(AmsEventMgt)); data/ion-3.2.1+dfsg/ams/library/loadmib.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ams/library/loadmib.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eps[MAXHOSTNAMELEN + 5 + 1]; data/ion-3.2.1+dfsg/ams/library/loadmib.c:151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ams/library/loadmib.c:208:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cnbr = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:267:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). contnbr = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:275:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). isNeighbor = 1 - (0 == atoi(value)); data/ion-3.2.1+dfsg/ams/library/loadmib.c:357:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). after = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:571:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). vnbr = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:598:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rzrsp = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:671:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rolenbr = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:761:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). subjnbr = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:957:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). znbr = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:965:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rsp = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:1040:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). contnbr = atoi(value); data/ion-3.2.1+dfsg/ams/library/loadmib.c:1398:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *atts[MAX_ATTRIBUTES * 2]; data/ion-3.2.1+dfsg/ams/library/loadmib.c:1492:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ams/library/loadmib.c:1551:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ams/library/tcpts.c:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endpointNameText[32]; data/ion-3.2.1+dfsg/ams/library/tcpts.c:558:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) (dp->tsep), (char *) &tsep, sizeof(TcpTsep)); data/ion-3.2.1+dfsg/ams/library/tcpts.c:688:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tcpAmsBuf, header, headerLen); data/ion-3.2.1+dfsg/ams/library/tcpts.c:691:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tcpAmsBuf + headerLen, content, contentLen); data/ion-3.2.1+dfsg/ams/library/tcpts.c:697:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tcpAmsBuf + headerLen + contentLen, (char *) &checksum, 2); data/ion-3.2.1+dfsg/ams/library/udpts.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ams/library/udpts.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ams/library/udpts.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endpointNameText[32]; data/ion-3.2.1+dfsg/ams/library/udpts.c:91:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ams/library/udpts.c:111:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &ipAddress, (char *) &(inetName->sin_addr.s_addr), 4); data/ion-3.2.1+dfsg/ams/library/udpts.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ams/library/udpts.c:195:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endpointNameText[32]; data/ion-3.2.1+dfsg/ams/library/udpts.c:231:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ams/library/udpts.c:251:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &ipAddress, (char *) &(inetName->sin_addr.s_addr), 4); data/ion-3.2.1+dfsg/ams/library/udpts.c:329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ams/library/udpts.c:338:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tsep.portNbr = atoi(colon + 1); data/ion-3.2.1+dfsg/ams/library/udpts.c:342:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) (ep->tsep), (char *) &tsep, sizeof(UdpTsep)); data/ion-3.2.1+dfsg/ams/library/udpts.c:362:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ams/library/udpts.c:371:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tsep.portNbr = atoi(colon + 1); data/ion-3.2.1+dfsg/ams/library/udpts.c:375:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) (dp->tsep), (char *) &tsep, sizeof(UdpTsep)); data/ion-3.2.1+dfsg/ams/library/udpts.c:423:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/ams/library/udpts.c:499:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/ams/library/udpts.c:502:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(udpAmsBuf, header, headerLen); data/ion-3.2.1+dfsg/ams/library/udpts.c:505:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(udpAmsBuf + headerLen, content, contentLen); data/ion-3.2.1+dfsg/ams/library/udpts.c:511:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(udpAmsBuf + headerLen + contentLen, (char *) &checksum, 2); data/ion-3.2.1+dfsg/ams/library/vmqts.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endpointNameText[32]; data/ion-3.2.1+dfsg/ams/library/vmqts.c:157:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) (dp->tsep), (char *) &tsep, sizeof(VmqTsep)); data/ion-3.2.1+dfsg/ams/library/vmqts.c:203:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmqAmsBuf, header, headerLen); data/ion-3.2.1+dfsg/ams/library/vmqts.c:206:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmqAmsBuf + headerLen, content, contentLen); data/ion-3.2.1+dfsg/ams/library/vmqts.c:212:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vmqAmsBuf + headerLen + contentLen, (char *) &checksum, 2); data/ion-3.2.1+dfsg/ams/library/vmqts.c:239:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ams/library/vmqts.c:241:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char vmqName[32]; data/ion-3.2.1+dfsg/ams/rams/librams.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[512]; data/ion-3.2.1+dfsg/ams/rams/librams.c:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gwEid[256]; data/ion-3.2.1+dfsg/ams/rams/librams.c:429:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gwEidBuffer[32]; data/ion-3.2.1+dfsg/ams/rams/librams.c:435:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &ipAddress, (char *) &(inetName->sin_addr.s_addr), 4); data/ion-3.2.1+dfsg/ams/rams/librams.c:535:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char envelope[ENVELOPELENGTH]; data/ion-3.2.1+dfsg/ams/rams/librams.c:537:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gwEid[256]; data/ion-3.2.1+dfsg/ams/rams/librams.c:759:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), data/ion-3.2.1+dfsg/ams/rams/librams.c:1073:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ams/rams/librams.c:1132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ams/rams/librams.c:1421:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char petitionLine[512]; data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:56:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(envelope + 8, (unsigned char *) &i2, 2); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:62:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(envelope + 12, enclosure, enclosureLength); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:92:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) & subj, enc + 12, 2); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:140:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &subj, envl + 8, 2); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:266:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header + 8, (char *) &context, 4); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:269:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header + 12, (char *) &i2, 2); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:275:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(enc->text + AMSMSGHEADER, content, contentLength); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:348:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pet->specification->envelope, envelope, data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:985:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorMsg[128]; data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1029:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gwEid[256]; data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1034:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorMsg[128]; data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1045:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1082:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rpdu->envelope, envelope, envelopeLength); data/ion-3.2.1+dfsg/ams/rams/ramscommon.c:1093:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorMsg[128]; data/ion-3.2.1+dfsg/ams/test/amsbenchr.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/ion-3.2.1+dfsg/ams/test/amsbenchr.c:75:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &msgNbr, txt, sizeof(int)); data/ion-3.2.1+dfsg/ams/test/amsbenchs.c:33:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int count = (argc > 1 ? atoi(argv[1]) : 0); data/ion-3.2.1+dfsg/ams/test/amsbenchs.c:34:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int size = (argc > 2 ? atoi(argv[2]) : 0); data/ion-3.2.1+dfsg/ams/test/amsbenchs.c:88:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, (char *) &content, sizeof(int)); data/ion-3.2.1+dfsg/ams/test/amshello.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/ams/test/amslog.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char replyText[256]; data/ion-3.2.1+dfsg/ams/test/amslog.c:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/ams/test/amslog.c:212:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subjectName[33]; data/ion-3.2.1+dfsg/ams/test/amslog.c:213:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char unitName[33]; data/ion-3.2.1+dfsg/ams/test/amslog.c:214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char roleName[33]; data/ion-3.2.1+dfsg/ams/test/amslog.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char continName[33]; // CW, 5/1/06 data/ion-3.2.1+dfsg/ams/test/amslogprt.c:15:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subjectName[33]; data/ion-3.2.1+dfsg/ams/test/amslogprt.c:17:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[8]; data/ion-3.2.1+dfsg/ams/test/amslogprt.c:63:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(text, (char *) &contentLength, data/ion-3.2.1+dfsg/ams/test/amspubsub.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ams/test/amsshell.c:83:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char subjectName[MAX_SUBJ_NAME + 1] = ""; data/ion-3.2.1+dfsg/ams/test/amsshell.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/ams/utils/amsmib.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char content[MAX_MIB_UPDATE_TEXT]; data/ion-3.2.1+dfsg/arch-android/iondtn/jni/gdslogger.c:4:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestampBuffer[20]; data/ion-3.2.1+dfsg/arch-android/iondtn/jni/gdslogger.c:5:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuf[256]; data/ion-3.2.1+dfsg/arch-android/iondtn/jni/iondtn.c:17:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filenamebuf[80]; data/ion-3.2.1+dfsg/arch-android/iondtn/jni/iondtn.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[255]; data/ion-3.2.1+dfsg/arch-android/iondtn/jni/iondtn.c:220:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[80]; data/ion-3.2.1+dfsg/arch-rtems/gdslogger.c:4:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestampBuffer[20]; data/ion-3.2.1+dfsg/arch-rtems/gdslogger.c:5:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuf[256]; data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filenamebuf[80]; data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[255]; data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[80]; data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[80]; data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:395:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:398:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "[i] Delta from UTC revised, is now %d.", delta); data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:405:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/arch-rtems/ionrtems.c:407:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "[i] Delta from UTC is %d.", ionvdb->deltaFromUTC); data/ion-3.2.1+dfsg/arch-rtems/pmqlsi.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuf[PMQLSA_MSGSIZE]; data/ion-3.2.1+dfsg/bp/brs/brsccla.c:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyName[32]; data/ion-3.2.1+dfsg/bp/brs/brsccla.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[DIGEST_LEN]; data/ion-3.2.1+dfsg/bp/brs/brsccla.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[16]; data/ion-3.2.1+dfsg/bp/brs/brsccla.c:222:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char registration[REGISTRATION_LEN]; data/ion-3.2.1+dfsg/bp/brs/brsccla.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expectedCountersign[DIGEST_LEN]; data/ion-3.2.1+dfsg/bp/brs/brsccla.c:224:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char receivedCountersign[DIGEST_LEN]; data/ion-3.2.1+dfsg/bp/brs/brsccla.c:234:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/brs/brsccla.c:254:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ductNbr = atoi(ductNbrString); data/ion-3.2.1+dfsg/bp/brs/brsccla.c:354:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bp/brs/brsccla.c:376:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(registration, (char *) &timeTag, 4); data/ion-3.2.1+dfsg/bp/brs/brsccla.c:468:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:100:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ductNbr = atoi(destDuctName); data/ion-3.2.1+dfsg/bp/brs/brsscla.c:278:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sdnvText[10]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:283:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char registration[24]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:285:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyName[32]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:286:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[DIGEST_LEN]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:289:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errtext[300]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:290:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char digest[DIGEST_LEN]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:385:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &timeTag, registration, 4); data/ion-3.2.1+dfsg/bp/brs/brsscla.c:418:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(registration + 4, digest, DIGEST_LEN); data/ion-3.2.1+dfsg/bp/brs/brsscla.c:739:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(atp.inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bp/brs/brsscla.c:800:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:855:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int baseDuctNbr = a2 ? atoi((char *) a2) : 1; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:856:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int lastDuctNbr = a3 ? atoi((char *) a3) : baseDuctNbr + 255; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:861:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int baseDuctNbr = argc > 2 ? atoi(argv[2]) : 1; data/ion-3.2.1+dfsg/bp/brs/brsscla.c:862:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int lastDuctNbr = argc > 3 ? atoi(argv[3]) : baseDuctNbr + 255; data/ion-3.2.1+dfsg/bp/bssp/bsspclo.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/cgr/libcgr.c:1150:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(proxNode->directive), (char *) &directive, data/ion-3.2.1+dfsg/bp/cgr/libcgr.c:1378:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stationEid[64]; data/ion-3.2.1+dfsg/bp/dccp/dccpcli.c:305:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rp->fromAddr, &fromAddr, sizeof(struct sockaddr)); data/ion-3.2.1+dfsg/bp/dccp/dccpcli.c:429:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/bp/dccp/dccpclo.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keepalive[4]; data/ion-3.2.1+dfsg/bp/dccp/dccpclo.c:379:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/dccp/dccpclo.c:469:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/bp/dgr/dgrcla.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/dgr/dgrcla.c:210:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:336:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidString[SDRSTRING_BUFSZ + 1]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:339:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[SDRSTRING_BUFSZ + 1]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:390:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nameBuf[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:436:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char toNodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demux[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char context[128]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:627:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:628:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:719:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2adminep.c:15:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memobuf[1024]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2adminep.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memobuf[1024]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidString[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demux[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:146:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outputNodeName, inputNodeName, nameLength); data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:197:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:299:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) dirbuf, (char *) &plan->defaultDirective, data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:306:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) dirbuf, (char *) &rule->directive, data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:316:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nameBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:351:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:378:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:400:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &plan.defaultDirective, (char *) defaultDir, data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:456:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &plan.defaultDirective, (char *) defaultDir, data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:471:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:521:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nameBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:558:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:606:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:646:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &ruleBuf.directive, (char *) directive, data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:675:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:715:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &ruleBuf.directive, (char *) directive, data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:730:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:88:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). imc_addKin(strtouvast(tokens[1]), atoi(tokens[2])); data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:99:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). imc_updateKin(strtouvast(tokens[1]), atoi(tokens[2])); data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/bp/imc/imcadmin.c:281:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/bp/imc/imcfw.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nss[64]; data/ion-3.2.1+dfsg/bp/imc/imcfw.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stationEid[64]; data/ion-3.2.1+dfsg/bp/imc/libimcfw.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceEid[32]; data/ion-3.2.1+dfsg/bp/imc/libimcfw.c:104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destEid[32]; data/ion-3.2.1+dfsg/bp/imc/libimcfw.c:173:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, groupNbrSdnv.text, groupNbrSdnv.length); data/ion-3.2.1+dfsg/bp/imc/libimcfw.c:385:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, groupNbrSdnv.text, groupNbrSdnv.length); data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:481:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[SDRSTRING_BUFSZ + 1]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:482:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:528:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char context[32]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:566:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceServiceString[21]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:567:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceNodeString[21]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:568:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char context[80]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:660:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidString[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:661:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[384]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:979:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:980:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/ipn/ipnadmin.c:1071:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/bp/ipn/ipnadminep.c:15:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memobuf[1024]; data/ion-3.2.1+dfsg/bp/ipn/ipnadminep.c:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memobuf[1024]; data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c:103:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) directive, (char *) &plan.defaultDirective, data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stationEid[64]; data/ion-3.2.1+dfsg/bp/ipn/ipnfw.c:205:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidString[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:645:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) dirbuf, (char *) &rule->directive, data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:700:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) dirbuf, (char *) &plan->defaultDirective, data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:1162:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) dirbuf, (char *) &group.defaultDirective, data/ion-3.2.1+dfsg/bp/library/acs/acsP.h:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eid[MAX_EID_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/acs/acsP.h:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceEid[MAX_EID_LEN]; data/ion-3.2.1+dfsg/bp/library/acs/acsP.h:203:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char acsLogBuf[MAX_ACSLOG_LEN]; \ data/ion-3.2.1+dfsg/bp/library/acs/acsappend.c:304:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cursor, "..."); data/ion-3.2.1+dfsg/bp/library/acs/acsid.c:85:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cbid.bundleId, &bid, sizeof(bid)); data/ion-3.2.1+dfsg/bp/library/acs/acsid.c:161:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(id, &cbid.bundleId, sizeof(cbid.bundleId)); data/ion-3.2.1+dfsg/bp/library/acs/acsrx.c:69:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cursor, "..."); data/ion-3.2.1+dfsg/bp/library/acs/acsrx.c:77:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(toReturn, reprAcs, MAX_REPRACS_LEN - reprAcsLeft); data/ion-3.2.1+dfsg/bp/library/acs/acsrx.c:209:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ctSig.creationTime, &bid.creationTime, sizeof(BpTimestamp)); data/ion-3.2.1+dfsg/bp/library/acs/acsserialize.c:49:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(args->buf + args->iBuf, encoded.text, encoded.length); data/ion-3.2.1+dfsg/bp/library/acs/acsserialize.c:55:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(args->buf + args->iBuf, encoded.text, encoded.length); data/ion-3.2.1+dfsg/bp/library/acs/acstx.c:78:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[100]; data/ion-3.2.1+dfsg/bp/library/acs/acstx.c:710:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/ion-3.2.1+dfsg/bp/library/bei.c:814:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, blkProcFlagsSdnv.text, blkProcFlagsSdnv.length); data/ion-3.2.1+dfsg/bp/library/bei.c:818:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, referenceCountSdnv.text, data/ion-3.2.1+dfsg/bp/library/bei.c:825:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, offsetSdnv.text, offsetSdnv.length); data/ion-3.2.1+dfsg/bp/library/bei.c:830:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, dataLengthSdnv.text, dataLengthSdnv.length); data/ion-3.2.1+dfsg/bp/library/bei.c:832:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, blockData, dataLength); data/ion-3.2.1+dfsg/bp/library/bei.c:897:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk->bytes, startOfBlock, blockLength); data/ion-3.2.1+dfsg/bp/library/bei.c:902:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk->bytes + 1, blkProcFlagsSdnv.text, blkProcFlagsSdnv.length); data/ion-3.2.1+dfsg/bp/library/bei.c:978:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk, (char *) blkHdr, blkHdr->size); data/ion-3.2.1+dfsg/bp/library/bei.h:102:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bytes[1]; /** Variable-length array. */ data/ion-3.2.1+dfsg/bp/library/bei.h:126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; /** Name of extension */ data/ion-3.2.1+dfsg/bp/library/bpP.h:410:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nss[MAX_NSS_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:440:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nss[MAX_NSS_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_SCHEME_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:468:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_SCHEME_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:473:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adminEid[MAX_EID_LEN]; data/ion-3.2.1+dfsg/bp/library/bpP.h:485:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:509:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:510:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ductName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:525:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:556:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ductName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:573:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_CL_PROTOCOL_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/bpP.h:774:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BP_MAX_BLOCK_SIZE]; data/ion-3.2.1+dfsg/bp/library/bpnm.h:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeID[256]; data/ion-3.2.1+dfsg/bp/library/bpnm.h:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bpVersionNbr[16]; data/ion-3.2.1+dfsg/bp/library/bpnm.h:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eid[BPNM_ENDPOINT_EIDSTRING_LEN]; data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c:19:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dataBuffer[32]; data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c:27:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dataBuffer, ageSdnv.text, ageSdnv.length); data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dataBuffer[32]; data/ion-3.2.1+dfsg/bp/library/ext/bae/bae.c:89:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dataBuffer, ageSdnv.text, ageSdnv.length); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cipherKeyName[BSP_KEY_NAME_LEN]; /** Cipherkey name used by this block.*/ data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expectedResult[BAB_HMAC_SHA1_RESULT_LEN]; data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:706:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(collabBlk.expectedResult, digest, digestLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:740:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(asb.resultData + 1, digestSdnv.text, digestSdnv.length); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:741:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(asb.resultData + digestOffset, digest, digestLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:956:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(collabBlk.expectedResult, digest, digestLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbspbab.c:1002:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(collabBlk.cipherKeyName), &(secInfo.cipherKeyName), data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c:390:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) sessionKeyValue, (char *) decryptedData, sessionKeyLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c:613:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(asb.resultData + 1, sessionKeySdnv.text, sessionKeySdnv.length); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c:614:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(asb.resultData + 1 + sessionKeySdnv.length, encryptedData, sessionKeyLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppcb.c:1116:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)encryptedKey, (char *)sessionKey, sessionKeyLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppib.c:641:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(asb.resultData + 1, digestSdnv.text, digestSdnv.length); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsppib.c:642:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(asb.resultData + digestOffset, digest, digestLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:74:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gMsg[GMSG_BUFLEN]; data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:160:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stream, value->text, value->length); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:286:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)asb->resultData, cursor, asb->resultLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:569:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, (char *)asb->resultData, asb->resultLen); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1019:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcNode, tmp2, strlen(tmp2)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1023:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destNode, ctxt->proxNodeEid, strlen(ctxt->proxNodeEid)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1035:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcNode, tmp2, strlen(tmp2)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1046:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(srcNode, tmp2, strlen(tmp2)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1058:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destNode, tmp2, strlen(tmp2)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1077:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp2, srcNode, strlen(srcNode)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1084:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp2, destNode, strlen(destNode)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1155:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[200]; data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1156:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1192:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(fileName, O_WRONLY | O_CREAT, 0666); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1208:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(fileName, O_WRONLY, 0666); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.h:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cipherKeyName[BSP_KEY_NAME_LEN]; data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:193:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctebBytes + i, custodyIdSdnv.text, custodyIdSdnv.length); data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:195:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctebBytes + i, custodianEid, custodianEidLen); data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:237:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(custodianEid, cursor, bytesRemaining); data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:270:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blk->object, &cteb, sizeof(CtebScratchpad)); data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:301:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cteb, acqExtBlk->object, data/ion-3.2.1+dfsg/bp/library/ext/ecos/ecos.c:20:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dataBuffer[32]; data/ion-3.2.1+dfsg/bp/library/ext/ecos/ecos.c:43:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dataBuffer + 2, flowLabelSdnv.text, flowLabelSdnv.length); data/ion-3.2.1+dfsg/bp/library/ext/phn/phn.c:93:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(adminEid, vscheme->adminEid, nameLength); data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.c:19:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dataBuffer[32]; data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.c:26:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dataBuffer, nodeNbrSdnv.text, nodeNbrSdnv.length); data/ion-3.2.1+dfsg/bp/library/ext/snid/snid.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uriBuffer[32]; data/ion-3.2.1+dfsg/bp/library/libbp.c:122:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sap.endpointMetaEid, &metaEid, sizeof(MetaEid)); data/ion-3.2.1+dfsg/bp/library/libbp.c:160:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) *bpsapPtr, (char *) &sap, sizeof(Sap)); data/ion-3.2.1+dfsg/bp/library/libbpP.c:804:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostNameBuf[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:811:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdString[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:1011:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:1012:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdString[SDRSTRING_BUFSZ + 1 + MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:1145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:1146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdString[SDRSTRING_BUFSZ + 1 + MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:1630:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdString[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:2173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[600]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:2174:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdString[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:2175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parmsString[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:2260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:2278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char toTimestamp[20]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:2281:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fromTimestamp[20]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:2769:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[BUNDLES_HASH_KEY_BUFLEN]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:4474:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bundleKey[BUNDLES_HASH_KEY_BUFLEN]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:4599:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) newBundle, (char *) oldBundle, sizeof(Bundle)); data/ion-3.2.1+dfsg/bp/library/libbpP.c:4755:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidBuf[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:4986:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *strings[8]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:5099:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, strings[i], stringLengths[i]); data/ion-3.2.1+dfsg/bp/library/libbpP.c:5126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceEidString[MAX_EID_LEN]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:5776:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nssBuf[42]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:5812:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scriptBuf[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:6412:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[200]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:6413:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:6713:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[80]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:6854:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(work->dictionary, cursor, bundle->dictionaryLength); data/ion-3.2.1+dfsg/bp/library/libbpP.c:7939:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, fragmentOffsetSdnv.text, fragmentOffsetSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:7942:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, fragmentLengthSdnv.text, fragmentLengthSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:7945:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, signalTimeSecondsSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:7949:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, signalTimeNanosecSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:7953:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, creationTimeSecondsSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:7957:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, creationTimeCountSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:7961:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, eidLengthSdnv.text, eidLengthSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:7964:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, csig->sourceEid, eidLength); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8038:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(csig->sourceEid, cursor, eidLength); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8181:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, fragmentOffsetSdnv.text, fragmentOffsetSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8184:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, fragmentLengthSdnv.text, fragmentLengthSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8187:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, receiptTimeSecondsSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8191:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, receiptTimeNanosecSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8195:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, custodyTimeSecondsSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8199:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, custodyTimeNanosecSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8203:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, forwardTimeSecondsSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8207:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, forwardTimeNanosecSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8211:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, deliveryTimeSecondsSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8215:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, deliveryTimeNanosecSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8219:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, deletionTimeSecondsSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8223:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, deletionTimeNanosecSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8227:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, creationTimeSecondsSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8231:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, creationTimeCountSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8235:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, eidLengthSdnv.text, eidLengthSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8238:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, rpt->sourceEid, eidLength); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8348:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rpt->sourceEid, cursor, eidLength); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8580:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, bundleProcFlagsSdnv.text, bundleProcFlagsSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8583:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, residualBlkLengthSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8589:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, eidSdnvs[i].text, eidSdnvs[i].length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8593:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, creationTimestampTimeSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8597:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, creationTimestampCountSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8601:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, lifetimeSdnv.text, lifetimeSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8604:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, dictionaryLengthSdnv.text, dictionaryLengthSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8616:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, fragmentOffsetSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8619:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, totalAduLengthSdnv.text, data/ion-3.2.1+dfsg/bp/library/libbpP.c:8657:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, blkProcFlagsSdnv.text, blkProcFlagsSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8660:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, payloadLengthSdnv.text, payloadLengthSdnv.length); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8761:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *strings[8]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:8847:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, strings[i], stringLengths[i]); data/ion-3.2.1+dfsg/bp/library/libbpP.c:9089:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:9949:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) bundle, (char *) &firstBundle, data/ion-3.2.1+dfsg/bp/library/libbpP.c:10050:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proxNodeEid[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/library/libbpP.c:10284:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) extendedCOS, (char *) &bundle.extendedCOS, data/ion-3.2.1+dfsg/bp/library/libbpP.c:10349:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, buffer + bytesParsed, *bytesBuffered); data/ion-3.2.1+dfsg/bp/library/libbpnm.c:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char computedName [BPNM_ENDPOINT_EIDSTRING_LEN]; data/ion-3.2.1+dfsg/bp/library/libbpnm.c:127:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char computedName [BPNM_ENDPOINT_EIDSTRING_LEN]; data/ion-3.2.1+dfsg/bp/ltp/ltpclo.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:21:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:22:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ductName[MAX_CL_DUCT_NAME_LEN]; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:98:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(id->socketName), socketName, sizeof(struct sockaddr)); data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ductName[MAX_CL_DUCT_NAME_LEN]; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char protocolName[MAX_CL_PROTOCOL_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:273:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ductName[MAX_CL_DUCT_NAME_LEN]; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:497:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + 1,lengthField.text,lengthField.length); data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:795:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostNameBuf[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:817:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + bytesToSend,&keepaliveIntervalNBO,2); data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:823:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + bytesToSend, eidLength.text, eidLength.length); data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:827:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + bytesToSend, adminEidString, adminEidLength); data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:924:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&requestedKeepAlive, &buffer[2],2); data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:1039:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + 2,&delay_uint16,2); data/ion-3.2.1+dfsg/bp/tcp/stcpcli.c:349:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(atp.inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bp/tcp/stcpcli.c:403:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bp/tcp/stcpclo.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/tcp/stcpclo.c:214:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bp/tcp/stcpclo.c:248:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bp/tcp/tcpcli.c:544:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(atp.inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bp/tcp/tcpcli.c:607:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bp/tcp/tcpclo.c:274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/tcp/tcpclo.c:362:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bp/tcp/tcpclo.c:427:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bp/test/bpchat.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuffer[1024]; data/ion-3.2.1+dfsg/bp/test/bpchat.c:93:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/ion-3.2.1+dfsg/bp/test/bpcounter.c:76:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int maxCount = (argc > 2 ? atoi(argv[2]) : 0); data/ion-3.2.1+dfsg/bp/test/bpcounter.c:88:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textBuf[256]; data/ion-3.2.1+dfsg/bp/test/bpdriver.c:64:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[DEFAULT_ADU_LENGTH] = "test..."; data/ion-3.2.1+dfsg/bp/test/bpdriver.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textBuf[256]; data/ion-3.2.1+dfsg/bp/test/bpdriver.c:384:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int cyclesRemaining = atoi((char *) a1); data/ion-3.2.1+dfsg/bp/test/bpdriver.c:387:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int aduLength = (a4 == 0 ? DEFAULT_ADU_LENGTH : atoi((char *) a4)); data/ion-3.2.1+dfsg/bp/test/bpdriver.c:389:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int ttl = (a5 == 0 ? DEFAULT_TTL : atoi((char *) a5)); data/ion-3.2.1+dfsg/bp/test/bpdriver.c:406:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl = atoi(&argv[5][1]); data/ion-3.2.1+dfsg/bp/test/bpdriver.c:410:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). aduLength = atoi(argv[5]); data/ion-3.2.1+dfsg/bp/test/bpdriver.c:415:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl = atoi(&argv[4][1]); data/ion-3.2.1+dfsg/bp/test/bpdriver.c:419:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). aduLength = atoi(argv[4]); data/ion-3.2.1+dfsg/bp/test/bpdriver.c:426:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cyclesRemaining = atoi(argv[1]); data/ion-3.2.1+dfsg/bp/test/bpecho.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dataToSend[ADU_LEN]; data/ion-3.2.1+dfsg/bp/test/bpecho.c:93:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceEid[1024]; data/ion-3.2.1+dfsg/bp/test/bping.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BPING_PAYLOAD_MAX_LEN]; data/ion-3.2.1+dfsg/bp/test/bping.c:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char respSrcEid[64]; data/ion-3.2.1+dfsg/bp/test/bping.c:270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pingPayload[BPING_PAYLOAD_MAX_LEN]; data/ion-3.2.1+dfsg/bp/test/bping.c:368:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char myflags[1024]; data/ion-3.2.1+dfsg/bp/test/bping.c:411:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). count = atoi(optarg); data/ion-3.2.1+dfsg/bp/test/bping.c:414:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). interval = atoi(optarg); data/ion-3.2.1+dfsg/bp/test/bping.c:421:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). priority = atoi(optarg); data/ion-3.2.1+dfsg/bp/test/bping.c:424:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). waitdelay = atoi(optarg); data/ion-3.2.1+dfsg/bp/test/bping.c:430:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl = atoi(optarg); data/ion-3.2.1+dfsg/bp/test/bpsink.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char content[80]; data/ion-3.2.1+dfsg/bp/test/bpsink.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[84]; data/ion-3.2.1+dfsg/bp/test/bpsource.c:55:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int ttl = (a5 == 0 ? DEFAULT_TTL : atoi((char *) a5)); data/ion-3.2.1+dfsg/bp/test/bpsource.c:70:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl=atoi(&argv[3][2]); data/ion-3.2.1+dfsg/bp/test/bpsource.c:78:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl=atoi(&argv[2][2]); data/ion-3.2.1+dfsg/bp/test/bpsource.c:93:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/bp/test/bpstats2.c:19:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char theBuffer[2048]; data/ion-3.2.1+dfsg/bp/test/bpstats2.c:70:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[0], (char *) &cosStats.tallies[0], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:72:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[1], (char *) &cosStats.tallies[1], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:74:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[2], (char *) &cosStats.tallies[2], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:88:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[3], (char *) data/ion-3.2.1+dfsg/bp/test/bpstats2.c:96:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[0], (char *) &cosStats.tallies[0], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:98:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[1], (char *) &cosStats.tallies[1], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:100:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[2], (char *) &cosStats.tallies[2], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:111:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[0], (char *) &cosStats.tallies[0], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:113:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[1], (char *) &cosStats.tallies[1], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:115:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[2], (char *) &cosStats.tallies[2], data/ion-3.2.1+dfsg/bp/test/bpstats2.c:143:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[3], (char *) data/ion-3.2.1+dfsg/bp/test/bpstats2.c:154:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &tallies[3], (char *) data/ion-3.2.1+dfsg/bp/udp/udpcli.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/bp/udp/udpcli.c:87:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &hostNbr, data/ion-3.2.1+dfsg/bp/udp/udpcli.c:206:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bp/udp/udpcli.c:243:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bp/udp/udpclo.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destDuctName[MAX_CL_DUCT_NAME_LEN + 1]; data/ion-3.2.1+dfsg/bp/udp/udpclo.c:168:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:74:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). logLevelRequested = atoi(tokens[1]); data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:80:24: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). heapWordsRequested = atol(tokens[2]); data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:101:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[200]; data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:115:12: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). acsSize = atol(tokens[2]); data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:125:14: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). acsDelay = atol(tokens[3]); data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:151:21: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). minimumCustodyId = atol(tokens[1]); data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:191:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:337:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cmdFile = fopen(cmdFileName, "r"); data/ion-3.2.1+dfsg/bp/utils/acslist.c:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char acslistBuf[256]; \ data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:277:20: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). protocolClass = atol(tokens[6]); data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:282:18: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nominalRate = atol(tokens[5]); data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:285:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). addProtocol(tokens[2], atoi(tokens[3]), atoi(tokens[4]), data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:285:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). addProtocol(tokens[2], atoi(tokens[3]), atoi(tokens[4]), data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:491:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fwdCmdBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char admAppCmdBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:495:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[512]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:556:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char recvScriptBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:651:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cliCmdBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:653:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:703:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cloCmdBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:705:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:1187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:1311:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:1314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bp/utils/bpadmin.c:1528:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/bp/utils/bpcancel.c:25:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int creationSec = argc > 2 ? atoi(argv[2]) : 0; data/ion-3.2.1+dfsg/bp/utils/bpcancel.c:26:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int creationCount = argc > 3 ? atoi(argv[3]) : 0; data/ion-3.2.1+dfsg/bp/utils/bpcancel.c:27:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int fragmentOffset = argc > 4 ? atoi(argv[4]) : 0; data/ion-3.2.1+dfsg/bp/utils/bpcancel.c:28:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int fragmentLength = argc > 5 ? atoi(argv[5]) : 0; data/ion-3.2.1+dfsg/bp/utils/bplist.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[300]; data/ion-3.2.1+dfsg/bp/utils/bplist.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[100]; data/ion-3.2.1+dfsg/bp/utils/bplist.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char digits[16] = "0123456789abcdef"; data/ion-3.2.1+dfsg/bp/utils/bplist.c:170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[300]; data/ion-3.2.1+dfsg/bp/utils/bplist.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuf[256]; data/ion-3.2.1+dfsg/bp/utils/bplist.c:327:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). priority = atoi(cursor + 1); data/ion-3.2.1+dfsg/bp/utils/bprecvfile.c:52:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[BPRECVBUFSZ]; data/ion-3.2.1+dfsg/bp/utils/bprecvfile.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[64]; data/ion-3.2.1+dfsg/bp/utils/bprecvfile.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char completionText[80]; data/ion-3.2.1+dfsg/bp/utils/bptrace.c:242:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl = atoi(argv[4]); data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:481:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:518:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(GRAPHVIZ_FILENAME, "w"); data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:605:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(IMAGE_FILENAME, "r"); data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:795:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. minLatency = ((char *)(a6))[0] == '1'; data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:800:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outputFile = fopen(a7, "w"); data/ion-3.2.1+dfsg/bp/utils/cgrfetch.c:871:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outputFile = fopen(optarg, "w"); data/ion-3.2.1+dfsg/bp/utils/hmackeys.c:17:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256]; data/ion-3.2.1+dfsg/bp/utils/hmackeys.c:21:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char key[20]; data/ion-3.2.1+dfsg/bp/utils/hmackeys.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[80]; data/ion-3.2.1+dfsg/bp/utils/lgsend.c:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/bss/library/bssP.h:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eid[32]; data/ion-3.2.1+dfsg/bss/library/libbssP.c:821:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[3] = "-1"; data/ion-3.2.1+dfsg/bss/library/libbssP.c:1122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[255]; data/ion-3.2.1+dfsg/bss/library/libbssP.c:1129:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). *dat = open(fileName, O_RDWR | O_CREAT | O_LARGEFILE, 0666); data/ion-3.2.1+dfsg/bss/library/libbssP.c:1137:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). *lst = open(fileName, O_RDWR | O_CREAT, 0666); data/ion-3.2.1+dfsg/bss/library/libbssP.c:1146:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). *tbl = open(fileName, O_RDWR | O_CREAT, 0666); data/ion-3.2.1+dfsg/bss/library/libbssP.c:1219:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[255]; data/ion-3.2.1+dfsg/bss/library/libbssP.c:1228:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). datRO = open(fileName, O_RDONLY | O_LARGEFILE, 0666); data/ion-3.2.1+dfsg/bss/library/libbssP.c:1236:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). lstRO = open(fileName, O_RDONLY, 0666); data/ion-3.2.1+dfsg/bss/library/libbssP.c:1245:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tblRO = open(fileName, O_RDONLY, 0666); data/ion-3.2.1+dfsg/bss/test/bssStreamingApp.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char framePayload[RCV_LENGTH]; data/ion-3.2.1+dfsg/bss/test/bssStreamingApp.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[100]; data/ion-3.2.1+dfsg/bss/test/bsscounter.c:41:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &dataValue, buf, sizeof(unsigned int)); data/ion-3.2.1+dfsg/bss/test/bsscounter.c:88:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &dataValue, buffer, sizeof(unsigned int)); data/ion-3.2.1+dfsg/bss/test/bssdriver.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char framePayload[RCV_LENGTH]; data/ion-3.2.1+dfsg/bss/test/bssdriver.c:83:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(framePayload, (char *) &dataValue, sizeof(unsigned int)); data/ion-3.2.1+dfsg/bss/test/bssrecv.c:43:6: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(buf) == -1) data/ion-3.2.1+dfsg/bss/test/bssrecv.c:49:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). reps = atoi(buf)%150; /* Maximum repetitions number of each sequence */ data/ion-3.2.1+dfsg/bss/test/bssrecv.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parameters[512]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char menuNav[512]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:217:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int choice = atoi((char *) a1); data/ion-3.2.1+dfsg/bss/test/bssrecv.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bssName[64]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:224:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[256]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eid[32]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fromTime[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char toTime[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char menuNav[512]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:248:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bssName[64]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[256]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:250:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eid[32]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:251:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fromTime[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/bss/test/bssrecv.c:252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char toTime[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:302:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char engineIdString[11]; data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:303:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bsoCmdString[SDRSTRING_BUFSZ + 64]; data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1566:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((*cursor), engineIdSdnv->text, engineIdSdnv->length); data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1570:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((*cursor), sessionNbrSdnv.text, sessionNbrSdnv.length); data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1590:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1597:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1728:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memo[64]; data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1851:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memo[64]; data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:2173:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:2174:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "Sending Ack"); data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:2346:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:2420:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "Sent data block: session %u blkTypeCode %d length %d.", data/ion-3.2.1+dfsg/bssp/tcp/tcpbsi.c:385:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(atp.inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bssp/tcp/tcpbsi.c:439:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bssp/tcp/tcpbso.c:179:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/bssp/tcp/tcpbso.c:206:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bssp/udp/udpbsi.c:156:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/bssp/udp/udpbsi.c:193:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memoBuf[1000]; data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN]; data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:259:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(peerInetName->sin_addr.s_addr), data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:271:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(bindInetName->sin_addr.s_addr), data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:316:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memoBuf[1024]; data/ion-3.2.1+dfsg/bssp/udp/udpbso.c:387:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(ownInetName->sin_addr.s_addr), data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:257:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:258:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:525:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[12]; data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:526:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/bssp/utils/bsspadmin.c:713:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownEid[64]; data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownEid[64]; data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destEid[64]; data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:138:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reportToEidBuf[64]; data/ion-3.2.1+dfsg/cfdp/bp/bputa.c:198:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &utParms, (char *) &fduBuffer.utParms, data/ion-3.2.1+dfsg/cfdp/daemon/cfdpclock.c:149:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) &fdu->transactionId, data/ion-3.2.1+dfsg/cfdp/daemon/cfdpclock.c:167:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) &fdu->transactionId, data/ion-3.2.1+dfsg/cfdp/include/cfdp.h:51:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[8]; /* Right-justified value. */ data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:79:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char utParms[sizeof(BpUtParms)]; data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proxySourceFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:158:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proxyDestFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:164:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char proxyFlowLabel[256]; data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char directoryName[256]; data/ion-3.2.1+dfsg/cfdp/library/cfdpP.h:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char directoryDestFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:139:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char defaultReaderBuf[CFDP_MAX_PDU_SIZE]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:170:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pktReaderBuf[CFDP_MAX_PDU_SIZE]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:260:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char textReaderBuf[CFDP_MAX_PDU_SIZE]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:670:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer, "cfdp", 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:687:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer, transactionId->sourceEntityNbr.buffer data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:690:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer, transactionId->transactionNbr.buffer data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:704:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char mpduBuf[CFDP_MAX_PDU_SIZE]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:718:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char firstFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:720:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:721:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msgText[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:740:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, (char *) &fileSize, 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:761:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sourceFileName, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:774:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, destFileName, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:859:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, firstFileName, firstFileNameLen); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:865:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, secondFileName, secondFileNameLen); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:918:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, (char *) msgText, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:943:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, (char *) msgText, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1007:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, flowLabel, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1030:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char eofBuf[10]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1037:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eofBuf + 2, (char *) &u4, 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1039:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(eofBuf + 6, (char *) &u4, 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1107:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fdu.utParms, utParms, utParmsLength); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1273:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &fdu.originatingTransactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1322:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &fdu.transactionId.sourceEntityNbr, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1333:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &fdu.destinationEntityNbr, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1360:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) &fdu.transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1362:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) transactionId, (char *) &fdu.transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1510:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1556:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reportBuffer[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1568:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1597:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reportBuffer[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1609:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1667:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textBuffer[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1722:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) transactionId, (char *) &event.transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1752:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) originatingTransactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1796:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &opsData.originatingTransactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1847:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &opsData.originatingTransactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1883:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) originatingTransactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1923:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:246:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char buffer[CFDP_MAX_PDU_SIZE]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:985:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &fdubuf->transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1126:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1161:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1258:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1397:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1712:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char firstFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1714:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1718:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgBuf[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1999:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char workingFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2000:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2001:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qualifiedFileName[MAXPATHLEN + 2]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2002:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char renameErrBuffer[600]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2023:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char workingFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2024:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reportBuffer[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2032:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) &fduBuf->transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2242:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2382:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pduHeader[28]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2466:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pduHeader + pduHeaderLength, cfdpdb.ownEntityNbr.buffer data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2469:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pduHeader + pduHeaderLength, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2474:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pduHeader + pduHeaderLength, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2489:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) buf, pduHeader, pduHeaderLength); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2668:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringBuf[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2669:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char workingNameBuffer[MAXPATHLEN + 2]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2698:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) &fdu->transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2975:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char firstNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:2977:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3001:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(firstNameBuf, *cursor, firstNameLength); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3024:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(secondNameBuf, *cursor, secondNameLength); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3200:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fdu->eofFaultLocation.buffer + padLength, *cursor, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3350:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) &fdu->transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringBuf[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3405:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringBuf, cursor, i); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3426:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringBuf, cursor, i); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3474:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &event.transactionId, (char *) &fdu->transactionId, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3612:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sourceEntityNbr.buffer + entityNbrPad, cursor, entityNbrLength); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3616:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(transactionNbr.buffer + transactionNbrPad, cursor, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3621:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destinationEntityNbr.buffer + entityNbrPad, cursor, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3648:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &deliveredCRC, buf + length, 2); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3679:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &transactionId.sourceEntityNbr, data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:3681:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &transactionId.transactionNbr, data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:51:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->proxyDestinationEntityNbr.buffer + pad, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:70:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->proxySourceFileName, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:90:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->proxyDestFileName, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nameBuffer[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:198:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nameBuffer, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:222:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nameBuffer, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:296:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->proxyFlowLabel, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:333:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nameBuffer[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:379:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nameBuffer, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:403:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nameBuffer, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:427:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nameBuffer, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:488:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->originatingTransactionId.sourceEntityNbr.buffer data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:496:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->originatingTransactionId.transactionNbr.buffer data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:509:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char textBuffer[6]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:522:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer, "cfdp", 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:616:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char textBuffer[600]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:681:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer, "cfdp", 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:690:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer + length, beneficiaryEntityNbr->buffer + pad, data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:695:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer + length, task->sourceFileName, data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:700:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer + length, task->destFileName, destFileNameLen); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:881:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer + length, task->flowLabel, data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:944:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char textBuffer[5]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:964:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer, "cfdp", 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1040:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->directoryName, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1060:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->directoryDestFileName, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1093:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->directoryName, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->directoryDestFileName, text, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1126:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char textBuffer[600]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1145:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer, "cfdp", 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1149:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer + 7, opsData->directoryName, dirNameLen); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1151:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer + 7 + dirNameLen + 1, opsData->directoryDestFileName, data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char listingFileName[256]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char listingLine[300]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1233:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char textBuffer[600]; data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1257:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer, "cfdp", 4); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1265:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer + length, task->directoryName, directoryNameLen); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1269:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(textBuffer + length, task->destFileName, destFileNameLen); data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:16:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:18:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:329:44: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. oK(cfdp_add_usrmsg(*msgsToUser, (unsigned char *) tokens[1], data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:349:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). action = atoi(tokens[1]); data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:370:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:555:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:565:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statusReportBuf[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:567:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char usrmsgBuf[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:570:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char firstPathName[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:571:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secondPathName[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgBuf[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:644:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:715:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:740:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cmdFile = open(cmdFileName, O_RDONLY, 0777); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:62:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_files[NUM_TMP_FILES][255]; /*tmp filename array*/ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:83:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iamrecursive = atoi((char*)a1); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:100:6: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). t = atoi((char*)a3); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:121:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). debug=atoi((char*)a5); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:417:11: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). tempfd = mkstemp(template); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1006:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1145:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buff, dp->d_name,_D_EXACT_NAMLEN(dp)); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1284:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tt, t, sizeof(struct transfer)); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1352:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1353:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1363:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statusReportBuf[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1365:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char usrmsgBuf[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1549:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->directoryName, text, length); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1566:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opsData->directoryDestFileName, text, length); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceFileNameBuf[256]; /*Buffer for name of source file*/ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileNameBuf[256]; /*Buffer for name of destination file*/ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:92:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dhost[256]; /*Destination Hostname*/ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:93:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dfile[256]; /*Destination Filename*/ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shost[256]; /*Source Hostname*/ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sfile[256]; /*Source Filename*/ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char directoryName[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char directoryDestFileName[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:30:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). debug=atoi((char*)a1); data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:33:4: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi((char*)a2)==1) data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileNameBuf[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statusReportBuf[256]; data/ion-3.2.1+dfsg/cfdp/utils/bpcpd.c:126:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char usrmsgBuf[256]; data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:129:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newDiscard = atoi(tokens[2]); data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:159:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newRequirecrc = atoi(tokens[2]); data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:220:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newCkperiod = atoi(tokens[2]); data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:250:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newMaxtimeouts = atoi(tokens[2]); data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:280:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newMaxtrnbr = atoi(tokens[2]); data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:310:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newSegsize = atoi(tokens[2]); data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:340:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newLimit = atoi(tokens[2]); data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:420:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:515:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:516:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/cfdp/utils/cfdpadmin.c:670:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_api.c:420:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[128]; data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/al_bp_types.h:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uri[AL_BP_MAX_ENDPOINT_ID]; //256 data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:199:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dtn_bundle_spec.blocks.blocks_val[i].data.data_val, data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:224:14: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dtn_bundle_spec.metadata.metadata_val[i].data.data_val, data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:348:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dtn_bundle_payload.buf.buf_val, bundle_payload.buf.buf_val, bundle_payload.buf.buf_len); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:386:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bp_bundle_payload.buf.buf_val, bundle_payload.buf.buf_val, bundle_payload.buf.buf_len); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:259:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tokenClassOfService,"%1u.%1u.%lu.%1u.%1u.%lu", tmpCustody, tmpPriority, (unsigned long) spec->priority.ordinal, data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:589:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rpt->sourceEid, cursor, eidLength); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:277:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(payload.buf.buf_val, buffer, bundle_payload.length); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:281:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(filename,O_CREAT|O_WRONLY, S_IRUSR | S_IWUSR); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:217:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). *f = fopen(buffer, "rb"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:249:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). *f = fopen(buffer, "wb"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:609:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*payload, buf, buf_size); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:22:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:24:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%ld.%ld;", result->tv_sec, result->tv_usec); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:38:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%lu;%lu;", timestamp.secs, timestamp.seqno); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[300]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:46:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "Dlv;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:47:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "Ct;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:48:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "Rcv;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:49:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "Fwd;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:50:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "Del;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:56:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "Reason;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[50]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:67:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, "%lu;", status_report.delivery_ts.secs); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:69:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, " ; "); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:73:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, "%lu;", status_report.custody_ts.secs); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:75:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, " ;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:79:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, "%lu;", status_report.receipt_ts.secs); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:81:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, " ;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:85:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, "%lu;", status_report.forwarding_ts.secs); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:87:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, " ;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:91:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, "%lu;", status_report.deletion_ts.secs); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:93:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, " ;"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:115:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%ld", num); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:122:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%lu", num); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_main.c:65:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(perf_opt.server_output_file,O_WRONLY | O_CREAT | O_TRUNC, 0644)) > 0) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_main.c:112:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(perf_opt.monitor_output_file,O_WRONLY | O_CREAT | O_TRUNC, 0644)) > 0) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:66:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source_file[256]; // complete name of source file: SOURCE_FILE_pid[_numBundle] data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp1[256]; // buffer for various purpose data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp2[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:148:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((log_file = fopen(perf_opt->log_filename, "w")) == NULL) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:598:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((transfer_fd = open(perf_opt->F_arg, O_RDONLY)) < 0) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:839:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). stream = fopen(source_file, "wb"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:924:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+HEADER_SIZE+BUNDLE_OPT_SIZE+sizeof(al_bp_timeval_t), &bundle.payload->buf.buf_crc, BUNDLE_CRC_SIZE); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1625:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->window = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1643:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->transmission_time = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1711:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). conn_opt->expiration = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1762:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int debug_level = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1764:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->debug_level = atoi(optarg) - 1; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1797:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->ip_port = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1813:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->bundle_ack_options.ack_expiration = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1845:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). conn_opt->priority.ordinal = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1878:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). conn_opt->flow_label = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1893:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->metadata_type = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:410:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename, "%lu_", relative_creation_timestamp.secs); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:428:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(filename, ".csv"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:432:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(full_filename, "w"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:465:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&start, session->start, sizeof(struct timeval)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:719:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:754:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->expiration_session = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:760:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int debug_level = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:762:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->debug_level = atoi(optarg) -1; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:791:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->ip_port = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:890:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(session->start, &start, sizeof(struct timeval)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:675:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename_ack[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:695:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd_ack = open(filename_ack,O_WRONLY|O_CREAT,0777); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:944:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:988:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). conn_opt->expiration = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1009:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int debug_level = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1011:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->debug_level = atoi(optarg) - 1; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1052:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). perf_opt->ip_port = atoi(optarg); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_types.h:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest_eid[AL_BP_MAX_ENDPOINT_ID]; // destination eid data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_types.h:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mon_eid[AL_BP_MAX_ENDPOINT_ID]; // monitor eid data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:188:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_WRONLY | O_CREAT, 0755); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * eid, temp[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:247:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char monitor_eid[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:289:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(temp, "%lu_", timestamp.secs); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:339:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((file = fopen(filename, "r")) != NULL) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:351:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * result, buffer[100]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:365:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdline_file[100]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:366:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], cmdline[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:367:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_exe[256], cmdline_exe[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:368:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_args[256], cmdline_args[256]; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:402:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(cmdline_file, O_RDONLY); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:442:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pid = atoi(item->d_name); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char content[1]; data/ion-3.2.1+dfsg/dgr/library/libdgr.c:266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inputBuffer[DGR_BUF_SIZE]; data/ion-3.2.1+dfsg/dgr/library/libdgr.c:267:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outputBuffer[DGR_BUF_SIZE]; data/ion-3.2.1+dfsg/dgr/library/libdgr.c:303:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tracebuf[128]; data/ion-3.2.1+dfsg/dgr/library/libdgr.c:760:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:767:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:780:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:787:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:794:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:801:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:808:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:814:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, rec->segment.content, rec->contentLength); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1687:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reportBuffer, sap->inputBuffer, headerLength); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1695:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1725:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reportBuffer, sap->inputBuffer, headerLength); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1733:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1740:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1747:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1754:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1761:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1768:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1775:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:1818:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reportBuffer[64]; data/ion-3.2.1+dfsg/dgr/library/libdgr.c:2104:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rec->segment.content, cursor, svcDataLength); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:2383:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) ipAddress, (char *) &(nm->sin_addr.s_addr), 4); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:2493:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rec->segment.content, content, length); data/ion-3.2.1+dfsg/dgr/library/libdgr.c:2691:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(content, rec->segment.content, rec->contentLength); data/ion-3.2.1+dfsg/dgr/test/dgr2file.c:26:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256]; data/ion-3.2.1+dfsg/dgr/test/dgr2file.c:31:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outputFile = fopen(fileName, "a"); data/ion-3.2.1+dfsg/dgr/test/dgr2file.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/dgr/test/dgr2file.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:120:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inputFile = fopen(fileName, "r"); data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:159:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inputFile = fopen(fileName, "r"); data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:237:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cyclesRequested = atoi(argv[3]); data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:197:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nbrOfPeers = atoi(argv[3]); data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:205:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cyclesRequested = atoi(argv[4]); data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:223:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:228:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inputFile = fopen(fileName, "r"); data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:263:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inputFile = fopen(fileName, "r"); data/ion-3.2.1+dfsg/dgr/test/file2udp.c:323:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/dgr/test/file2udp.c:327:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, (char *) &seqCounter, 40); data/ion-3.2.1+dfsg/dgr/test/file2udp.c:328:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + 4, line, lineLen); data/ion-3.2.1+dfsg/dgr/test/file2udp.c:375:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/dgr/test/file2udp.c:389:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cyclesRequested = atoi(argv[3]); data/ion-3.2.1+dfsg/dgr/test/file2udp.c:407:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/dgr/test/file2udp.c:418:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inputFile = fopen(fileName, "r"); data/ion-3.2.1+dfsg/dgr/test/file2udp.c:444:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inputFile = fopen(fileName, "r"); data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256]; data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:125:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outputFile = fopen(fileName, "a"); data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:159:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/dgr/test/udp2file.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256]; data/ion-3.2.1+dfsg/dgr/test/udp2file.c:30:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outputFile = fopen(fileName, "a"); data/ion-3.2.1+dfsg/dgr/test/udp2file.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/dgr/test/udp2file.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/dgr/test/udp2file.c:63:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &hostNbr, 4); data/ion-3.2.1+dfsg/dtpc/daemon/dtpcd.c:26:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownEid[64]; data/ion-3.2.1+dfsg/dtpc/daemon/dtpcd.c:214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownEid[64]; data/ion-3.2.1+dfsg/dtpc/library/libdtpc.c:186:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) *dtpcsapPtr, (char *) &sap, sizeof(Sap)); data/ion-3.2.1+dfsg/dtpc/library/libdtpc.c:273:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcEid[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/library/libdtpc.c:415:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) dlvBuffer->srcEid, (char *) srcEid, SDRSTRING_BUFSZ); data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) vprofile, (char *) profile, sizeof(Profile)); data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:660:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidBuf[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:911:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, profNum.text, profNum.length); data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:913:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, seqNum.text, seqNum.length); data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:957:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, topicID.text, topicID.length); data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:959:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, recordsCounter.text, recordsCounter.length); data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:1044:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reportToEid[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:1045:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dstEid[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:1406:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char repToEid[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:1744:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcEid[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2490:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcEid[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2608:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dstEid[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2609:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcEid[64]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2717:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dstEid[64]; data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2790:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, profileIdSdnv.text, profileIdSdnv.length); data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:2792:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, seqNumSdnv.text, seqNumSdnv.length); data/ion-3.2.1+dfsg/dtpc/test/dtpcreceive.c:98:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int topicID = (argc > 1 ? atoi(argv[1]) : 0); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:90:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[BUF_SIZE] = "this is a testfile created by \ data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char totalbytes[21]; data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:268:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int cycles = atoi((char *) a1); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:269:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int rate = atoi((char *) a2); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:270:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int recordLength = atoi((char *) a3); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:271:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int topicID = atoi((char *) a4); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:272:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int profileID = atoi((char *) a5); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:290:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). profileID = atoi(argv[5]); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:292:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). topicID = atoi(argv[4]); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:294:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). recordLength = atoi(argv[3]); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:296:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rate = atoi(argv[2]); data/ion-3.2.1+dfsg/dtpc/test/dtpcsend.c:298:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cycles = atoi(argv[1]); data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdrBuf[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:164:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). profileID = atoi(tokens[2]); data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:292:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:416:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[10]; data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:417:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:596:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[512]; data/ion-3.2.1+dfsg/dtpc/utils/dtpcadmin.c:642:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cmdFile = open(cmdFileName, O_RDONLY, 0777); data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:51:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void sha1_hmac(const unsigned char *key, size_t keylen, data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:52:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char *input, size_t ilen, data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:53:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char output[20]) data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:58:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void sha2(const unsigned char *input, size_t ilen, data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:59:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char output[32], int is224) data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:111:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(output, input, length); data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:134:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(context, key, key_length); data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:155:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result, context, resultLen); data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:163:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void hmac_sha1_sign(const unsigned char *key, size_t keylen, data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:164:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char *input, size_t ilen, data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:165:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char output[20]) data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:197:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(context, key, key_length); data/ion-3.2.1+dfsg/ici/crypto/NULL_SUITES/crypto.c:218:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result, context, resultLen); data/ion-3.2.1+dfsg/ici/daemon/winion.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memName[32]; data/ion-3.2.1+dfsg/ici/daemon/winion.c:32:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(memName, "%d.mmap", key); data/ion-3.2.1+dfsg/ici/daemon/winion.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char semaphoreName[32]; data/ion-3.2.1+dfsg/ici/daemon/winion.c:48:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(semaphoreName, "%d.event", key); data/ion-3.2.1+dfsg/ici/daemon/winion.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[5]; data/ion-3.2.1+dfsg/ici/daemon/winion.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply[1] = { '\0' }; data/ion-3.2.1+dfsg/ici/daemon/winion.c:165:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &key, msg + 1, sizeof(DWORD)); data/ion-3.2.1+dfsg/ici/include/crypto.h:37:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char m[256]; /*!< permutation table */ data/ion-3.2.1+dfsg/ici/include/crypto.h:75:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern void hmac_sha1_sign(const unsigned char *key, size_t keylen, data/ion-3.2.1+dfsg/ici/include/crypto.h:76:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char *input, size_t ilen, data/ion-3.2.1+dfsg/ici/include/crypto.h:77:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char output[20]); data/ion-3.2.1+dfsg/ici/include/ion.h:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdrName[MAX_SDR_NAME + 1]; data/ion-3.2.1+dfsg/ici/include/ion.h:58:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathName[MAXPATHLEN + 1]; data/ion-3.2.1+dfsg/ici/include/ion.h:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char workingDirectoryName[256]; data/ion-3.2.1+dfsg/ici/include/ionsec.h:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ciphersuiteName[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyName[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ciphersuiteName[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:92:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyName[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ciphersuiteName[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyName[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ciphersuiteName[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyName[32]; /* NULL-terminated. */ data/ion-3.2.1+dfsg/ici/include/ionsec.h:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyName[32]; data/ion-3.2.1+dfsg/ici/include/ionsec.h:142:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyName[32]; data/ion-3.2.1+dfsg/ici/include/platform.h:161:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define iopen(a,b,c) open(a,b,c) data/ion-3.2.1+dfsg/ici/include/platform.h:605:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char text[10]; data/ion-3.2.1+dfsg/ici/include/psm.h:26:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char partitionName[32]; data/ion-3.2.1+dfsg/ici/include/sdrmgt.h:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdrName[MAX_SDR_NAME + 1]; data/ion-3.2.1+dfsg/ici/library/ion.c:308:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ionLogFileName[264] = ""; data/ion-3.2.1+dfsg/ici/library/ion.c:311:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestampBuffer[20]; data/ion-3.2.1+dfsg/ici/library/ion.c:313:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msgbuf[256]; data/ion-3.2.1+dfsg/ici/library/ion.c:391:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeListFileName[265]; data/ion-3.2.1+dfsg/ici/library/ion.c:395:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuf[256]; data/ion-3.2.1+dfsg/ici/library/ion.c:398:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineSdrName[MAX_SDR_NAME + 1]; data/ion-3.2.1+dfsg/ici/library/ion.c:399:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineWdName[256]; data/ion-3.2.1+dfsg/ici/library/ion.c:611:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eventName[32]; data/ion-3.2.1+dfsg/ici/library/ion.c:615:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(eventName, "%u.sigterm", (unsigned int) processId); data/ion-3.2.1+dfsg/ici/library/ion.c:809:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wdname[256]; data/ion-3.2.1+dfsg/ici/library/ion.c:886:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iondbBuf.workingDirectoryName, wdname, 256); data/ion-3.2.1+dfsg/ici/library/ion.c:898:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iondbBuf.parmcopy, parms, sizeof(IonParms)); data/ion-3.2.1+dfsg/ici/library/ion.c:1048:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wdnamebuf[256]; data/ion-3.2.1+dfsg/ici/library/ion.c:1201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[RFX_NOTE_LEN]; data/ion-3.2.1+dfsg/ici/library/ion.c:1533:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ici/library/ion.c:1535:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char configFileNameBuffer[PATHLENMAX + 1 + 9 + 1]; data/ion-3.2.1+dfsg/ici/library/ion.c:1537:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[512]; data/ion-3.2.1+dfsg/ici/library/ion.c:1539:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/ici/library/ion.c:1544:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[2]; data/ion-3.2.1+dfsg/ici/library/ion.c:1660:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parms->wmKey = atoi(tokens[1]); data/ion-3.2.1+dfsg/ici/library/ion.c:1666:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parms->wmSize = atoi(tokens[1]); data/ion-3.2.1+dfsg/ici/library/ion.c:1672:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. parms->wmAddress = (char *) atol(tokens[1]); data/ion-3.2.1+dfsg/ici/library/ion.c:1672:32: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parms->wmAddress = (char *) atol(tokens[1]); data/ion-3.2.1+dfsg/ici/library/ion.c:1685:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parms->sdrWmSize = atoi(tokens[1]); data/ion-3.2.1+dfsg/ici/library/ion.c:1691:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parms->configFlags = atoi(tokens[1]); data/ion-3.2.1+dfsg/ici/library/ion.c:1697:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parms->heapWords = atoi(tokens[1]); data/ion-3.2.1+dfsg/ici/library/ion.c:1703:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). parms->heapKey = atoi(tokens[1]); data/ion-3.2.1+dfsg/ici/library/ion.c:1727:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[512]; data/ion-3.2.1+dfsg/ici/library/ion.c:1857:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procName[PROC_NAME_LEN]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:406:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyId[32]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:473:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyId[32]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:549:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) newRef, (char *) &argRef, sizeof(PubKeyRef)); data/ion-3.2.1+dfsg/ici/library/ionsec.c:654:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyId[32]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:711:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyId[32]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:805:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyId[32]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:862:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyId[32]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:1173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rmStr [5]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:1177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:1661:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(outputEid, inputEid, eidLength); data/ion-3.2.1+dfsg/ici/library/ionsec.c:1758:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:2024:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/library/ionsec.c:2267:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eidBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/library/memmgr.c:99:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mem_mgr_name_buffer[(MEMMGR_MAX_NAME + 1) data/ion-3.2.1+dfsg/ici/library/platform.c:613:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textBuffer[1024]; data/ion-3.2.1+dfsg/ici/library/platform.c:631:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &hostInetAddress, hostInfo->h_addr, 4); data/ion-3.2.1+dfsg/ici/library/platform.c:639:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textBuffer[128]; data/ion-3.2.1+dfsg/ici/library/platform.c:721:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &hostInetAddress, hostInfo->h_addr, 4); data/ion-3.2.1+dfsg/ici/library/platform.c:869:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &hostInetAddress, hostInfo->h_addr, 4); data/ion-3.2.1+dfsg/ici/library/platform.c:1027:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &hostInetAddress, hostInfo->h_addr, 4); data/ion-3.2.1+dfsg/ici/library/platform.c:1349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textBuffer[1024]; data/ion-3.2.1+dfsg/ici/library/platform.c:1366:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char itoa_str[33]; data/ion-3.2.1+dfsg/ici/library/platform.c:1374:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char utoa_str[33]; data/ion-3.2.1+dfsg/ici/library/platform.c:1383:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char errmsgs[ERRMSGS_BUFSIZE]; data/ion-3.2.1+dfsg/ici/library/platform.c:1389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineNbrBuffer[32]; data/ion-3.2.1+dfsg/ici/library/platform.c:1425:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, errmsgs, spaceFreed); data/ion-3.2.1+dfsg/ici/library/platform.c:1427:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(errmsgs, errmsgs + spaceFreed, errmsgsLength); data/ion-3.2.1+dfsg/ici/library/platform.c:1504:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textBuffer[1024]; data/ion-3.2.1+dfsg/ici/library/platform.c:1544:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msgwritebuf[ERRMSGS_BUFSIZE]; data/ion-3.2.1+dfsg/ici/library/platform.c:1586:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msgdiscardbuf[ERRMSGS_BUFSIZE]; data/ion-3.2.1+dfsg/ici/library/platform.c:2176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostnameBuf[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ici/library/platform.c:2195:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostnameBuf[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ici/library/platform.c:2276:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i4 = atoi(delimiter + 1); /* Get port number. */ data/ion-3.2.1+dfsg/ici/library/platform.c:2434:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[SN_FMT_SIZE]; data/ion-3.2.1+dfsg/ici/library/platform.c:2438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scratchpad[64]; data/ion-3.2.1+dfsg/ici/library/platform.c:2516:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(scratchpad, "%d", minFieldLength); data/ion-3.2.1+dfsg/ici/library/platform.c:2518:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fmt + fmtLen, scratchpad, numLen); data/ion-3.2.1+dfsg/ici/library/platform.c:2545:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(scratchpad, "%d", precision); data/ion-3.2.1+dfsg/ici/library/platform.c:2547:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fmt + fmtLen, scratchpad, data/ion-3.2.1+dfsg/ici/library/platform.c:2709:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(scratchpad, "%#lx", (unsigned long) vpval); data/ion-3.2.1+dfsg/ici/library/platform.c:2719:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + stringLength, scratchpad, fieldLength); data/ion-3.2.1+dfsg/ici/library/platform.c:2784:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, from, copySize); data/ion-3.2.1+dfsg/ici/library/platform.c:2806:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + currTextSize, from, copySize); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[5]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply[1]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:183:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg + 1, (char *) &keyDword, sizeof(DWORD)); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memName[32]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:333:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(memName, "%d.mmap", key); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:507:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_ARG_LENGTH + 1]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:571:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf->arg, arg, argLen); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1044:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char semName[32]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1051:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(semName, "%d.event", SM_SEMKEY); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1083:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char semName[32]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1085:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(semName, "%d.event", key); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char semName[32]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:1150:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(semName, "%d.event", key); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuf[33]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2578:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &parms, parm, sizeof(SpawnParms)); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2601:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuf[33]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2827:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdLine[256]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2861:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eventName[32]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2879:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(eventName, "%d.sigterm", task); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2930:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eventName[32]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2942:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(eventName, "%u.wakeup", (unsigned int) GetCurrentProcessId()); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2957:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eventName[32]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:2961:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(eventName, "%u.wakeup", (unsigned int) processId); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:3149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/ici/library/platform_sm.c:3152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[11]; data/ion-3.2.1+dfsg/ici/library/psm.c:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/ion-3.2.1+dfsg/ici/library/psm.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[33]; data/ion-3.2.1+dfsg/ici/library/psm.c:551:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) psp(partition, entryObj), (char *) &entry, data/ion-3.2.1+dfsg/ici/library/psm.c:628:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &entry, (char *) psp(partition, entryObj), data/ion-3.2.1+dfsg/ici/library/psm.c:844:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[100]; data/ion-3.2.1+dfsg/ici/library/psm.c:1080:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[100]; data/ion-3.2.1+dfsg/ici/library/psm.c:1116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[100]; data/ion-3.2.1+dfsg/ici/library/psm.c:1255:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[100]; data/ion-3.2.1+dfsg/ici/library/rfx.c:585:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) psp(ionwm, cxaddr), (char *) cxref, sizeof(IonCXref)); data/ion-3.2.1+dfsg/ici/library/rfx.c:716:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char contactIdString[128]; data/ion-3.2.1+dfsg/ici/library/rfx.c:834:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fromTimeBuffer[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/ici/library/rfx.c:835:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char toTimeBuffer[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/ici/library/rfx.c:1081:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) psp(ionwm, rxaddr), (char *) rxref, sizeof(IonRXref)); data/ion-3.2.1+dfsg/ici/library/rfx.c:1171:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) psp(ionwm, rxaddr2), (char *) rxref2, sizeof(IonRXref)); data/ion-3.2.1+dfsg/ici/library/rfx.c:1232:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rangeIdString[128]; data/ion-3.2.1+dfsg/ici/library/rfx.c:1401:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fromTimeBuffer[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/ici/library/rfx.c:1402:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char toTimeBuffer[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/ici/library/sptrace.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; /* for concurrent tracing */ data/ion-3.2.1+dfsg/ici/library/sptrace.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/ici/library/sptrace.c:211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/ici/library/sptrace.c:402:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[384]; data/ion-3.2.1+dfsg/ici/library/sptrace.c:404:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[256]; data/ion-3.2.1+dfsg/ici/library/zco.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathName[256]; data/ion-3.2.1+dfsg/ici/library/zco.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cleanupScript[256]; data/ion-3.2.1+dfsg/ici/library/zco.c:371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathBuf[256]; data/ion-3.2.1+dfsg/ici/library/zco.c:454:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fileRef.pathName, pathName, pathLen); data/ion-3.2.1+dfsg/ici/library/zco.c:464:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fileRef.cleanupScript, cleanupScript, scriptLen); data/ion-3.2.1+dfsg/ici/library/zco.c:485:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathBuf[256]; data/ion-3.2.1+dfsg/ici/library/zco.c:564:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fileRef.pathName, pathName, pathLen); data/ion-3.2.1+dfsg/ici/library/zco.c:575:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fileRef.cleanupScript, cleanupScript, scriptLen); data/ion-3.2.1+dfsg/ici/sdr/sdrP.h:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/ion-3.2.1+dfsg/ici/sdr/sdrP.h:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathName[MAXPATHLEN]; data/ion-3.2.1+dfsg/ici/sdr/sdrP.h:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char restartCmd[32]; data/ion-3.2.1+dfsg/ici/sdr/sdrcatlg.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_SDR_NAME + 1]; data/ion-3.2.1+dfsg/ici/sdr/sdrhash.c:21:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[255]; data/ion-3.2.1+dfsg/ici/sdr/sdrhash.c:213:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(kvpair.key, key, keyLength); data/ion-3.2.1+dfsg/ici/sdr/sdrmgt.c:815:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &trailing, (char *) &nextTrailing, data/ion-3.2.1+dfsg/ici/sdr/sdrmgt.c:843:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &leading, (char *) &prevLeading, data/ion-3.2.1+dfsg/ici/sdr/sdrmgt.c:1085:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/ion-3.2.1+dfsg/ici/sdr/sdrstring.c:27:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef unsigned char SdrStringBuffer[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/sdr/sdrstring.c:67:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stringBuf + 1, from, length); data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:671:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logfilename[PATHLENMAX + 1 + 32 + 1 + 6 + 1]; data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:999:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logfilename[PATHLENMAX + 1 + 32 + 1 + 6 + 1]; data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1002:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dbfilename[PATHLENMAX + 1 + 32 + 1 + 3 + 1]; data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dbfilename[PATHLENMAX + 1 + 32 + 1 + 3 + 1]; data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logfilename[PATHLENMAX + 1 + 32 + 1 + 6 + 1]; data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1553:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dbfilename[PATHLENMAX + 1 + 32 + 1 + 3 + 1]; data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logfilename[PATHLENMAX + 1 + 32 + 1 + 6 + 1]; data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1915:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sdrv->dbsm + into, from, length); data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1961:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(into, sdrv->dbsm + from, length); data/ion-3.2.1+dfsg/ici/test/file2sdr.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdrName[256]; data/ion-3.2.1+dfsg/ici/test/file2sdr.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/test/file2sdr.c:297:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). configFlags = atoi(argv[1]); data/ion-3.2.1+dfsg/ici/test/file2sm.c:26:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/ici/test/file2sm.c:155:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) psp(wm, lineAddress), line, lineLen); data/ion-3.2.1+dfsg/ici/test/owltsim.c:19:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char toNode[33]; data/ion-3.2.1+dfsg/ici/test/owltsim.c:20:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fromNode[33]; data/ion-3.2.1+dfsg/ici/test/owltsim.c:22:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destHostName[MAXHOSTNAMELEN + 1]; data/ion-3.2.1+dfsg/ici/test/owltsim.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char content[1]; data/ion-3.2.1+dfsg/ici/test/owltsim.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[256]; data/ion-3.2.1+dfsg/ici/test/owltsim.c:149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[256]; data/ion-3.2.1+dfsg/ici/test/owltsim.c:188:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ici/test/owltsim.c:271:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dg->content, buffer, datagramLen); data/ion-3.2.1+dfsg/ici/test/owltsim.c:371:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). configFile = fopen(fileName, "r"); data/ion-3.2.1+dfsg/ici/test/owltsim.c:408:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) stp, (char *) &stpBuf, data/ion-3.2.1+dfsg/ici/test/owlttb.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char content[1]; data/ion-3.2.1+dfsg/ici/test/owlttb.c:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[256]; data/ion-3.2.1+dfsg/ici/test/owlttb.c:170:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seg->content, buffer, segLength); data/ion-3.2.1+dfsg/ici/test/owlttb.c:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[256]; data/ion-3.2.1+dfsg/ici/test/owlttb.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[256]; data/ion-3.2.1+dfsg/ici/test/owlttb.c:437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[256]; data/ion-3.2.1+dfsg/ici/test/owlttb.c:525:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(seg->content, buffer, segLength); data/ion-3.2.1+dfsg/ici/test/owlttb.c:559:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/ici/test/psmshell.c:24:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/ici/test/psmshell.c:224:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). partitionSize = atoi(argv[1]); data/ion-3.2.1+dfsg/ici/test/sdr2file.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdrName[256]; data/ion-3.2.1+dfsg/ici/test/sdr2file.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256]; data/ion-3.2.1+dfsg/ici/test/sdr2file.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/test/sdr2file.c:278:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). configFlags = atoi(argv[1]); data/ion-3.2.1+dfsg/ici/test/sm2file.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256]; data/ion-3.2.1+dfsg/ici/test/smlistsh.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/ici/test/smrbtsh.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/ici/test/smrbtsh.c:329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:214:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). owlt = atoi(tokens[6]); data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:288:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[RFX_NOTE_LEN]; data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:365:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[RFX_NOTE_LEN]; data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:416:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newDelta = atoi(tokens[2]); data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:433:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newMaxClockError = atoi(tokens[2]); data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:456:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:466:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newSyncVal = atoi(tokens[2]); data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:497:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newRate = atoi(tokens[2]); data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:528:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newRate = atoi(tokens[2]); data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:708:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:857:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:858:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:1059:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:172:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char datValue[1024]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[3]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:209:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). datLen = atoi(tokens[5]); data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:219:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, cursor, 2); data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:269:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_addBspPibRule(tokens[2], tokens[3], atoi(tokens[4]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:291:57: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_addBspPcbRule(tokens[2], tokens[3], atoi(tokens[4]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:313:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_addLtpRecvAuthRule(atoi(tokens[2]), atouc(tokens[3]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:335:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_addLtpXmitAuthRule(atoi(tokens[2]), atouc(tokens[3]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:403:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_updateBspPibRule(tokens[2], tokens[3], atoi(tokens[4]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:425:60: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_updateBspPcbRule(tokens[2], tokens[3], atoi(tokens[4]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:447:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_updateLtpRecvAuthRule(atoi(tokens[2]), atouc(tokens[3]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:469:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_updateLtpXmitAuthRule(atoi(tokens[2]), atouc(tokens[3]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:514:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_removeLtpRecvAuthRule(atoi(tokens[2])); data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:526:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_removeLtpXmitAuthRule(atoi(tokens[2])); data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:565:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_removeBspPibRule(tokens[2], tokens[3], atoi(tokens[4])); data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:571:60: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_removeBspPcbRule(tokens[2], tokens[3], atoi(tokens[4])); data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:582:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:594:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char effectiveTime[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:595:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char assertionTime[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:597:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char datValue[1024]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:598:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datValueDisplay[(sizeof datValue * 2)]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:602:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[(sizeof datValueDisplay) * 2]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:638:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcEidBuf[SDRSTRING_BUFSZ], destEidBuf[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:639:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:654:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcEidBuf[SDRSTRING_BUFSZ], destEidBuf[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:655:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:670:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcEidBuf[SDRSTRING_BUFSZ], destEidBuf[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:671:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:686:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:704:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:801:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_findBspPibRule(tokens[2], tokens[3], atoi(tokens[4]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:819:58: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_findBspPcbRule(tokens[2], tokens[3], atoi(tokens[4]), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:837:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_findLtpRecvAuthRule(atoi(tokens[2]), &addr, &elt); data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:854:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sec_findLtpXmitAuthRule(atoi(tokens[2]), &addr, &elt); data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:1025:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[9]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:1026:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:1178:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1024]; data/ion-3.2.1+dfsg/ici/utils/ionwarn.c:151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestampBuffer[TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/ici/utils/ionwarn.c:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alarmBuffer[40 + TIMESTAMPBUFSZ]; data/ion-3.2.1+dfsg/ici/utils/ionwarn.c:222:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) np, (char *) neighbor, sizeof(IonNeighbor)); data/ion-3.2.1+dfsg/ici/utils/killm.c:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[5] = {0, 0, 0, 0, 0}; data/ion-3.2.1+dfsg/ltp/aos/aoslsi.c:150:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ltp/aos/aoslsi.c:187:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/ltp/aos/aoslso.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN]; data/ion-3.2.1+dfsg/ltp/aos/aoslso.c:144:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ltp/aos/aoslso.c:166:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/ltp/daemon/ltpmeter.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memo[64]; data/ion-3.2.1+dfsg/ltp/dccp/dccplsi.c:377:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ltp/dccp/dccplso.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keepalive[4]; data/ion-3.2.1+dfsg/ltp/dccp/dccplso.c:359:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:22:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char null_key[20] = {0xc3, 0x7b, 0x7e, 0x64, 0x92, 0x58, 0x43, 0x40, data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:96:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hashValue[32]; data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char authVal[20]; data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:115:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(authVal, segmentRawData + hashOffset, trailerExt->length); data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:130:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hashValue[32]; data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:365:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[1]; data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:424:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[32] = ""; data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:517:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hashValue[32]; data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:560:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char authVal[512]; data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:602:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/ext/auth/auth.c:669:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*cursor, authVal, field->length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ltpmeterCmdString[64]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char engineIdString[11]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lsoCmdString[SDRSTRING_BUFSZ + 64]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:1904:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) psp(ltpwm, addr), (char *) &refbuf, data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2282:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((*cursor), sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2307:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, engineIdSdnv->text, engineIdSdnv->length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2311:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sessionNbrSdnv.text, sessionNbrSdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2365:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2371:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2377:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2389:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2395:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2422:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2428:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2434:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2440:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2447:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2465:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2468:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, sdnv.text, sdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2487:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, serialNbrSdnv.text, serialNbrSdnv.length); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:2722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memo[64]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3574:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3575:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "Sending RS: %u to %u.", rs->pdu.lowerBound, rs->pdu.upperBound); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3600:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3783:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "Reporting %d bytes missing.", shortfall); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3956:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[200]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:3957:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:4098:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) psp(wm, addr), (char *) &refbuf, sizeof(LtpSegmentRef)); data/ion-3.2.1+dfsg/ltp/library/libltpP.c:4152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:4954:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:5215:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "Sent checkpoint: session %u segTypeCode %d length %d offset %d.", data/ion-3.2.1+dfsg/ltp/library/libltpP.c:5354:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/ion-3.2.1+dfsg/ltp/library/libltpP.c:5764:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "- offset %u length %u", claim->offset, claim->length); data/ion-3.2.1+dfsg/ltp/library/ltpei.c:188:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extField->value, *cursor, valueLength); data/ion-3.2.1+dfsg/ltp/library/ltpei.h:156:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/ion-3.2.1+dfsg/ltp/sda/libsda.c:93:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[2048]; data/ion-3.2.1+dfsg/ltp/test/ltpcounter.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[255]; data/ion-3.2.1+dfsg/ltp/test/ltpdriver.c:19:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[DEFAULT_ADU_LENGTH] = "test..."; data/ion-3.2.1+dfsg/ltp/test/sdatest.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_LINE_LEN + 1]; data/ion-3.2.1+dfsg/ltp/test/sdatest.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_LINE_LEN + 1]; data/ion-3.2.1+dfsg/ltp/udp/udplsi.c:152:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(inetName->sin_addr.s_addr), (char *) &ipAddress, 4); data/ion-3.2.1+dfsg/ltp/udp/udplsi.c:189:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[500]; data/ion-3.2.1+dfsg/ltp/udp/udplso.c:143:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memoBuf[1000]; data/ion-3.2.1+dfsg/ltp/udp/udplso.c:178:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ownHostName[MAXHOSTNAMELEN]; data/ion-3.2.1+dfsg/ltp/udp/udplso.c:261:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(peerInetName->sin_addr.s_addr), data/ion-3.2.1+dfsg/ltp/udp/udplso.c:273:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(bindInetName->sin_addr.s_addr), data/ion-3.2.1+dfsg/ltp/udp/udplso.c:318:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memoBuf[1024]; data/ion-3.2.1+dfsg/ltp/udp/udplso.c:389:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &(ownInetName->sin_addr.s_addr), data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[SDRSTRING_BUFSZ]; data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:388:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:528:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:652:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tokens[12]; data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:653:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[80]; data/ion-3.2.1+dfsg/ltp/utils/ltpadmin.c:845:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/agent/adm_agent_priv.c:136:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &gAgentInstr, result.length); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:219:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &node_state, sizeof(node_state)); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:220:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value + sizeof(node_state), &state, sizeof(state)); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:776:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[2048]; data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:777:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptrs[128]; data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:803:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,nm_sdnv.text, nm_sdnv.length); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:806:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, names, result.length - nm_sdnv.length); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:816:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:825:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:833:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &endpoint, sizeof(endpoint)); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:845:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:853:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:863:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, endpoint.eid, result.length); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:872:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:880:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:898:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:906:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:925:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:933:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:170:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &state, result.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:267:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:275:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:285:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &induct, result.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:295:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:303:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:313:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, induct.inductName, result.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:517:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value,inducts.value,inducts.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:518:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value + inducts.length, outducts.value, outducts.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:527:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[2048]; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:528:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptrs[128]; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:547:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,nm_sdnv.text, nm_sdnv.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:550:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, names, result.length - nm_sdnv.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[2048]; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:558:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptrs[128]; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:580:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,nm_sdnv.text, nm_sdnv.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:583:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, names, result.length - nm_sdnv.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:597:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:605:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:615:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &outduct, result.length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:626:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:637:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:645:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, outduct.outductName, result.length); data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:206:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &bytes_reserved, sizeof(bytes_reserved)); data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:207:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(result.value[sizeof(bytes_reserved)]), &bytes_used, sizeof(bytes_used)); data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:223:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &bytes_reserved, sizeof(bytes_reserved)); data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:240:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &bytes_used, sizeof(bytes_used)); data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:271:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,num_sdnv.text, num_sdnv.length); data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:277:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,&val, sizeof(val)); data/ion-3.2.1+dfsg/nm/agent/adm_ltp_priv.c:305:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result.value, &span, sizeof(span)); data/ion-3.2.1+dfsg/nm/agent/ldc.c:272:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(rpt->contents[idx]), temp->contents, temp->size); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:123:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char last_insert_id[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:193:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "DELETE FROM dbtMIDs WHERE ID=%d", result); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:202:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "ALTER TABLE dbtMIDs AUTO_INCREMENT=%d", result); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:273:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT * FROM dbtMessagesControls WHERE ID=%d", id); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:301:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int type = atoi(row[1]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:315:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Lyst contents = db_fetch_mid_col(atoi(row[6])); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:358:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:365:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT * FROM dbtDataCollection WHERE CollectionID=%d", data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:437:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:515:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). result->length = atoi(row[1]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:531:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result->value, row[2], result->length); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:567:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:570:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT * FROM dbtMessagesDefinitions WHERE ID=%d", id); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:589:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int mid_id = atoi(row[2]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:590:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int mc_id = atoi(row[3]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:649:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:657:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT * FROM dbtMIDs WHERE ID=%d", id); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:679:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uint8_t issFlag = (uint8_t) atoi(row[4]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:680:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uint8_t tagFlag = (uint8_t) atoi(row[5]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:748:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:753:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:776:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if((new_mid = db_fetch_mid(atoi(row[0]))) == NULL) data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:779:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). atoi(row[0])); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:822:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:863:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). result = atoi(row[0]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1051:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, root_data, root_size); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1055:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, parms, parms_size); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1122:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1145:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int dc_idx = atoi(row[0]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1250:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1255:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT * FROM dbtRegisteredAgents WHERE ID=%d", id); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1324:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1329:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT TableName from lvtMessageTablesList WHERE ID=%d", data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1351:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT TYPE FROM dbtMessagesControls where ID=%d", data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1381:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi(entry_row[0]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1435:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1442:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT * FROM dbtMessagesControls WHERE ID=%d", id); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1463:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int type = atoi(row[1]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1475:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Lyst contents = db_fetch_mid_col(atoi(row[6])); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1532:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1538:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "INSERT INTO dbtIncoming(ReceivedTS,GeneratedTS,State) " data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1549:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT LAST_INSERT_ID() FROM dbtIncoming"); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1568:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). result = atoi(row[0]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1597:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1600:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query,"UPDATE dbtIncoming SET State = State + 1 WHERE ID = %d", id); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1954:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[128]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1962:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idx = atoi(row[0]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2061:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "UPDATE dbtOutgoing SET State=2 WHERE ID=%d", idx); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2110:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT * FROM dbtOutgoingMessages WHERE OutgoingID=%d", data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2126:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int table_idx = atoi(row[2]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2127:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int entry_idx = atoi(row[3]); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2358:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT AgentID FROM dbtOutgoingRecipients " data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2385:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if((reg_agent = db_fetch_reg_agent(atoi(row[0]))) != NULL) data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2436:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[1024]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:2451:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(query, "SELECT * FROM dbtOutgoing WHERE State=%d", TX_READY); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[10]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mid_str[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:333:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:337:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mid_str[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:400:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:404:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mid_str[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:475:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:476:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mid_str[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:552:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:553:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mid_str[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:619:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mid_str[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:620:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:677:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_EID_LEN]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:717:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_EID_LEN]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:759:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char choice[3]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:969:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:997:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(result->issuer), data, 4); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:1051:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(result->tag), data, 4); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:1107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:1193:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if((cur_mid_idx = atoi(cur_mid)) <= max_idx) data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:1776:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmp_oid[8] = {0x07,0x01,0x02,0x03,0x04,0x05,0x06,0x00}; data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:394:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, &flag, 1); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:397:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, len.text, len.length); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:400:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, tmp, nn_size); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:403:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, off.text, off.length); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:463:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result, value, size); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:496:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result, value, size); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1063:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"("UVAST_FIELDSPEC"): ",num); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1145:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, buffer, data_len); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1219:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"("UVAST_FIELDSPEC"): ",num); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1226:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor, "%ld, ",val); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1300:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&temp, buffer, data_len); data/ion-3.2.1+dfsg/nm/shared/adm/adm.h:87:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ADM_MAX_NAME]; /**> Name of this MIB item */ data/ion-3.2.1+dfsg/nm/shared/adm/adm.h:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ADM_MAX_NAME]; data/ion-3.2.1+dfsg/nm/shared/adm/adm_agent.c:125:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&state, buffer, data_len); data/ion-3.2.1+dfsg/nm/shared/adm/adm_agent.c:142:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(result, data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[256]; data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:351:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[256]; data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:354:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&endpoint, buffer, data_len); data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:165:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&state, buffer, data_len); data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:182:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(result, data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:199:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&induct, buffer, data_len); data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:237:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&outduct, buffer, data_len); data/ion-3.2.1+dfsg/nm/shared/adm/adm_ltp.c:190:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(result, data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:90:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, id.text, id.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:93:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, msg->agent_id.name, id_len); data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:164:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, &(msg->mask),1); data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:265:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,code,code_size); data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:269:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, time.text, time.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:272:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, list, list_size); data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:369:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result->agent_id.name,cursor,sdnv_tmp); data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:102:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,time_sdnv.text,time_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:105:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,period_sdnv.text,period_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:108:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,count_sdnv.text,count_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:111:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, contents, contents_len); data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:187:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,time_sdnv.text,time_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_ctrl.c:190:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, contents, contents_len); data/ion-3.2.1+dfsg/nm/shared/msg/msg_def.c:112:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, id, id_len); data/ion-3.2.1+dfsg/nm/shared/msg/msg_def.c:116:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, contents, contents_len); data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:101:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, contents, contents_len); data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:181:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,id,id_len); data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:185:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,size.text, size.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:188:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,entry->contents,entry->size); data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:332:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,time.text, time.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:335:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, num_rpts_sdnv.text, num_rpts_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:340:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,temp_space[i], temp_len[i]); data/ion-3.2.1+dfsg/nm/shared/msg/msg_reports.c:592:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cur_entry->contents, cursor, cur_entry->size); data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:346:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,hdr,hdr_len); data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:350:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,msg->contents, msg->size); data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:355:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, acl, acl_len); data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:494:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, num_msgs_sdnv.text, num_msgs_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:497:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, time_sdnv.text, time_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/msg/pdu.c:502:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, tmp_data[i], tmp_size[i]); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:350:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result, src_mid, sizeof(mid_t)); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:367:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result->raw, src_mid->raw, src_mid->raw_size); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:560:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result->raw, buffer, *bytes_used); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:682:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, iss.text, iss.length); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:687:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,oid_val, oid_size); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:693:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, tag.text, tag.length); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:849:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"MID:\n---------------------\nFlag: %#x",mid->flags); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:851:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"\nType : "); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:854:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: cursor += sprintf(cursor,"DATA\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:855:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: cursor += sprintf(cursor,"CONTROL\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:856:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: cursor += sprintf(cursor,"LITERAL\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:857:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 3: cursor += sprintf(cursor,"OPERATOR\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:858:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. default: cursor += sprintf(cursor,"UNKNOWN\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:861:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"Cat: "); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:864:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: cursor += sprintf(cursor,"ATOMIC\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:865:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: cursor += sprintf(cursor,"COMPUTED\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:866:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: cursor += sprintf(cursor,"COLLECTION\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:867:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. default: cursor += sprintf(cursor,"UNKNOWN\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:876:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"None.\n"); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:888:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"None.\n"); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1088:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result, mid->raw, mid->raw_size); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1457:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"MID COLLECTION:\n-------------\n"); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1463:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"--------------\n"); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1577:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"MC : "); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1583:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,".\n"); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1693:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, num_sdnv.text, num_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1704:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,cur_mid->raw, cur_mid->raw_size); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:147:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, value, len); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:414:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result->value, src_oid->value, result->value_size); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:741:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(new_oid->value[1]), cursor, oid_size); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:946:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"OID:\n---------------------\nType: "); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:950:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 0: cursor += sprintf(cursor,"FULL\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:951:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 1: cursor += sprintf(cursor,"PARAM\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:952:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 2: cursor += sprintf(cursor,"COMP_FULL\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:953:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case 3: cursor += sprintf(cursor,"COMP_PARAM\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:954:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. default: cursor += sprintf(cursor,"UNKNOWN\n"); break; data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:957:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor,"num_parm: %ld\n", lyst_length(oid->params)); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:969:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. cursor += sprintf(cursor, "nn_id: %d\n", (uint32_t)oid->nn_id); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:1192:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, nn_sdnv.text, nn_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:1197:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,oid->value, oid->value_size); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:1213:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, parms, parm_size); data/ion-3.2.1+dfsg/nm/shared/primitives/oid.c:1347:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_nn, nn, sizeof(oid_nn_t)); data/ion-3.2.1+dfsg/nm/shared/utils/nm_types.h:30:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_EID_LEN]; data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:284:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_entry->value, cur_entry->value, new_entry->length); data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:409:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(entry->value, cursor, entry->length); data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:564:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, num_sdnv.text, num_sdnv.length); data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:574:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor, tmp.text, tmp.length); data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:577:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cursor,entry->value, entry->length); data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:732:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[3]; data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:759:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(temp, "%.2x", (unsigned int)buffer[i]); data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:828:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_s[3]; data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:886:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp_s, &(value[i]), 2); data/ion-3.2.1+dfsg/tests/1000.loopback/dotest.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rxContent[sizeof(testLine)]; data/ion-3.2.1+dfsg/tests/1300.loopback-tcp/dotest.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rxContent[sizeof(testLine)]; data/ion-3.2.1+dfsg/tests/1400.loopback-stcp/dotest.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rxContent[sizeof(testLine)]; data/ion-3.2.1+dfsg/tests/1500.loopback-brs/dotest.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rxContent[sizeof(testLine)]; data/ion-3.2.1+dfsg/tests/1500.loopback-brs/dotest.c:76:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[20]; data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceFileNameBuf[256]; data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileNameBuf[256]; data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statusReportBuf[256]; data/ion-3.2.1+dfsg/tests/issue-330-cfdpclock-FDU-removal/cfdplisten.c:64:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char usrmsgBuf[256]; data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c:21:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceFileNameBuf[256]; data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c:23:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileNameBuf[256]; data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c:48:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(parms.destFileNameBuf, "../rcvfile"); data/ion-3.2.1+dfsg/tests/issue-333-cfdp-orig-ID-type/send.c:50:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(parms.sourceFileNameBuf, "../dotest"); data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c:18:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceFileNameBuf[256]; data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c:20:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char destFileNameBuf[256]; data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c:55:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(parms.sourceFileNameBuf, "dotest.c"); data/ion-3.2.1+dfsg/tests/issue-334-cfdp-transaction-id/dotest.c:56:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(parms.destFileNameBuf, "testfile"); data/ion-3.2.1+dfsg/tests/library/ionstart.c:15:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdline[256]; data/ion-3.2.1+dfsg/tests/library/paths.c:13:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char path_prefix[256] = ""; data/ion-3.2.1+dfsg/tests/library/paths.c:25:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefixedFileName[PATHLENMAX]; data/ion-3.2.1+dfsg/ams/library/amscommon.c:511:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(pubkeyname) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:519:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(privkeyname) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:767:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(name); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1085:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(*gwEid) > MAX_GW_EID) /* Invalid. */ data/ion-3.2.1+dfsg/ams/library/amscommon.c:1133:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(name); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1146:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(description) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1154:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(symmetricKeyName) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1162:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(marshalFnName) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1170:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(unmarshalFnName) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1199:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(name); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1211:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(publicKeyName) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1219:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(privateKeyName) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1322:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(roleName); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1367:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(name); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1378:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(publicKeyName) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1386:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(privateKeyName) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1428:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(gwEid) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1434:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(symmetricKeyName) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1572:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(name); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1668:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(authname); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1789:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(name); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1802:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). descLen = strlen(description) + 1; data/ion-3.2.1+dfsg/ams/library/amscommon.c:1842:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(endpointName); data/ion-3.2.1+dfsg/ams/library/amscommon.c:1881:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(epspec) > MAX_EP_SPEC) data/ion-3.2.1+dfsg/ams/library/amscommon.c:2092:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). authNameLen = strlen(authName); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2399:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). authNameLen = strlen(authName); data/ion-3.2.1+dfsg/ams/library/amscommon.c:2470:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textLength = strlen(text); data/ion-3.2.1+dfsg/ams/library/amsd.c:394:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). supplementLength = 2 + strlen(ept) + 1; data/ion-3.2.1+dfsg/ams/library/amsd.c:428:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cellspecLength = 2 + strlen(ept) + 1; data/ion-3.2.1+dfsg/ams/library/amsd.c:505:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). supplementLength = 2 + strlen(ept) + 1; data/ion-3.2.1+dfsg/ams/library/amsd.c:1020:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). supplementLen = strlen(rsState->tsif.ept) + 1; data/ion-3.2.1+dfsg/ams/library/dgrts.c:87:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eptLen = strlen(endpointNameText) + 1; data/ion-3.2.1+dfsg/ams/library/dgrts.c:196:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eptLen = strlen(endpointNameText) + 1; data/ion-3.2.1+dfsg/ams/library/libams.c:193:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textLength = strlen(text); data/ion-3.2.1+dfsg/ams/library/libams.c:1156:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += (strlen(sap->mamsTsif.ept) + 1); data/ion-3.2.1+dfsg/ams/library/libams.c:1171:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += (strlen(tsif->ts->name) data/ion-3.2.1+dfsg/ams/library/libams.c:1172:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + 1 + strlen(tsif->ept) + 1); data/ion-3.2.1+dfsg/ams/library/libams.c:1192:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cursor += (strlen(cursor) + 1); data/ion-3.2.1+dfsg/ams/library/libams.c:1210:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(tsif->ts->name); data/ion-3.2.1+dfsg/ams/library/libams.c:1215:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(tsif->ept); data/ion-3.2.1+dfsg/ams/library/libams.c:2920:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eptLen = strlen(ept) + 1; data/ion-3.2.1+dfsg/ams/library/libams.c:3284:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int eptLength = strlen(ept) + 1; data/ion-3.2.1+dfsg/ams/library/libams.c:3704:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(applicationName); data/ion-3.2.1+dfsg/ams/library/libams.c:3707:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(authorityName); data/ion-3.2.1+dfsg/ams/library/libams.c:3710:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(unitName); data/ion-3.2.1+dfsg/ams/library/libams.c:3712:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(roleName); data/ion-3.2.1+dfsg/ams/library/loadmib.c:1583:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). length = read(sourceFile, buf, sizeof(buf)); data/ion-3.2.1+dfsg/ams/library/tcpts.c:330:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eptLen = strlen(endpointNameText) + 1; data/ion-3.2.1+dfsg/ams/library/udpts.c:118:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eptLen = strlen(endpointNameText) + 1; data/ion-3.2.1+dfsg/ams/library/udpts.c:257:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eptLen = strlen(endpointNameText) + 1; data/ion-3.2.1+dfsg/ams/library/vmqts.c:89:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eptLen = strlen(endpointNameText) + 1; data/ion-3.2.1+dfsg/ams/rams/librams.c:214:7: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (sscanf(buffer, "%u %255s %u %d %u %u %u", data/ion-3.2.1+dfsg/ams/rams/librams.c:283:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(logLine); data/ion-3.2.1+dfsg/ams/test/amshello.c:47:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textlen = strlen(buffer) + 1; data/ion-3.2.1+dfsg/ams/test/amslog.c:113:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). subjectNameLength = strlen(subjectName); data/ion-3.2.1+dfsg/ams/test/amslog.c:166:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). replyLength = strlen(replyText); data/ion-3.2.1+dfsg/ams/test/amslog.c:295:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringLength = strlen(cmdString); data/ion-3.2.1+dfsg/ams/test/amslog.c:311:15: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. parmCount = sscanf(cmdString, "%32s %32s %32s %32s", data/ion-3.2.1+dfsg/ams/test/amspubsub.c:117:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ams_publish(me, subjectNbr, 0, 0, strlen(msgText) + 1, msgText, 0) data/ion-3.2.1+dfsg/ams/test/amsshell.c:117:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newline = line + strlen(line) - 1; data/ion-3.2.1+dfsg/ams/test/amsshell.c:155:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). contentLength = strlen(content) + 1; data/ion-3.2.1+dfsg/ams/test/amsshell.c:163:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). subjectNameLength = strlen(subjectNameString); data/ion-3.2.1+dfsg/ams/test/amsshell.c:176:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). contentLength = strlen(content) + 1; data/ion-3.2.1+dfsg/ams/test/amsshell.c:179:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subjectName) == 0) data/ion-3.2.1+dfsg/ams/utils/amsmib.c:104:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). result = read(fd, content, contentLength); data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:105:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(parmToken) >= SDRSTRING_BUFSZ) data/ion-3.2.1+dfsg/bp/dtn2/dtn2admin.c:148:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(destDuctName) >= SDRSTRING_BUFSZ) data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:48:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nssLength = strlen(nss); data/ion-3.2.1+dfsg/bp/dtn2/dtn2fw.c:77:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(startOfDemux) >= SDRSTRING_BUFSZ) data/ion-3.2.1+dfsg/bp/dtn2/libdtn2fw.c:131:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nameLength = strlen(inputNodeName); data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:790:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHKERR(strlen(viaEid) <= MAX_SDRSTRING); data/ion-3.2.1+dfsg/bp/ipn/libipnfw.c:841:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHKERR(strlen(viaEid) <= MAX_SDRSTRING); data/ion-3.2.1+dfsg/bp/library/acs/acsid.c:51:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bid.sourceEid, sourceEid, MAX_EID_LEN); data/ion-3.2.1+dfsg/bp/library/acs/acsid.c:268:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bid.sourceEid, sourceEid, MAX_EID_LEN); data/ion-3.2.1+dfsg/bp/library/acs/acstx.c:599:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(newCustodian.eid, eid, MAX_EID_LEN); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1019:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(srcNode, tmp2, strlen(tmp2)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1023:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(destNode, ctxt->proxNodeEid, strlen(ctxt->proxNodeEid)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1035:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(srcNode, tmp2, strlen(tmp2)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1046:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(srcNode, tmp2, strlen(tmp2)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1058:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(destNode, tmp2, strlen(tmp2)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1077:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(tmp2, srcNode, strlen(srcNode)); data/ion-3.2.1+dfsg/bp/library/ext/bsp/extbsputil.c:1084:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(tmp2, destNode, strlen(destNode)); data/ion-3.2.1+dfsg/bp/library/ext/cteb/cteb.c:162:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). custodianEidLen = strlen(custodianEid); data/ion-3.2.1+dfsg/bp/library/libbpP.c:1942:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bpString->textLength = strlen(string); data/ion-3.2.1+dfsg/bp/library/libbpP.c:2011:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(eidString) == 8 && strcmp(eidString, _nullEid()) == 0) data/ion-3.2.1+dfsg/bp/library/libbpP.c:2038:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). metaEid->nssLength = strlen(metaEid->nss); data/ion-3.2.1+dfsg/bp/library/libbpP.c:2132:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). schemeNameLength = strlen(dictionary + eid->schemeNameOffset); data/ion-3.2.1+dfsg/bp/library/libbpP.c:2133:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nssLength = strlen(dictionary + eid->nssOffset); data/ion-3.2.1+dfsg/bp/library/libbpP.c:2761:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(buffer); data/ion-3.2.1+dfsg/bp/library/libbpP.c:2971:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(fwdCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/bp/library/libbpP.c:2988:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(admAppCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/bp/library/libbpP.c:3215:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(metaEid.nss) > MAX_NSS_LEN) data/ion-3.2.1+dfsg/bp/library/libbpP.c:3450:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(protocolName) > MAX_CL_PROTOCOL_NAME_LEN) data/ion-3.2.1+dfsg/bp/library/libbpP.c:3678:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ductName) > MAX_CL_DUCT_NAME_LEN) data/ion-3.2.1+dfsg/bp/library/libbpP.c:3684:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cliCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/bp/library/libbpP.c:3762:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cliCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/bp/library/libbpP.c:3937:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ductName) > MAX_CL_DUCT_NAME_LEN) data/ion-3.2.1+dfsg/bp/library/libbpP.c:3951:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cloCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/bp/library/libbpP.c:4058:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cloCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/bp/library/libbpP.c:4799:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(eid) >= SDRSTRING_BUFSZ) data/ion-3.2.1+dfsg/bp/library/libbpP.c:6366:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eidLen = strlen(senderEid) + 1; data/ion-3.2.1+dfsg/bp/library/libbpP.c:6881:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nullEidLen = strlen(_nullEid()); data/ion-3.2.1+dfsg/bp/library/libbpP.c:7913:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eidLength = strlen(csig->sourceEid); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8144:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eidLength = strlen(rpt->sourceEid); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8785:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringLength = strlen(string); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8790:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringLength = strlen(string); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8795:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringLength = strlen(string); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8800:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringLength = strlen(string); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8805:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringLength = strlen(string); data/ion-3.2.1+dfsg/bp/library/libbpP.c:8810:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringLength = strlen(string); data/ion-3.2.1+dfsg/bp/library/libbpP.c:9098:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHKERR(*proxNodeEid && strlen(proxNodeEid) < MAX_SDRSTRING); data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:798:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). adminEidStringLen = strlen(hostNameBuf) + 11; data/ion-3.2.1+dfsg/bp/tcp/libtcpcla.c:803:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). adminEidLength = strlen(adminEidString); data/ion-3.2.1+dfsg/bp/test/bpchat.c:44:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLength = strlen(lineBuffer); data/ion-3.2.1+dfsg/bp/test/bping.c:176:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(respSrcEid, dlv.bundleSourceEid, 63); data/ion-3.2.1+dfsg/bp/test/bping.c:356:4: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(interval * 1e6); data/ion-3.2.1+dfsg/bp/test/bping.c:372:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(myflags, flags, 1023); data/ion-3.2.1+dfsg/bp/test/bpsource.c:123:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLength = strlen(text); data/ion-3.2.1+dfsg/bp/utils/acsadmin.c:196:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLength = strlen(line); data/ion-3.2.1+dfsg/bp/utils/bplist.c:30:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(cursor) + 1; data/ion-3.2.1+dfsg/bp/utils/bptrace.c:150:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int msgLength = strlen(trace) + 1; data/ion-3.2.1+dfsg/bss/library/libbssP.c:221:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, (char *) index, sizeof(tblIndex)) < 0) data/ion-3.2.1+dfsg/bss/library/libbssP.c:256:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (read(fileD, entry, sizeof(lstEntry)) < 0)) data/ion-3.2.1+dfsg/bss/library/libbssP.c:375:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (read(fileD, rec, sizeof(dataRecord)) < 0)) data/ion-3.2.1+dfsg/bss/library/libbssP.c:387:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fileD, buffer, length*sizeof(char)) < 0) data/ion-3.2.1+dfsg/bss/test/bssrecv.c:191:6: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (sscanf(parameters, "%63s %255s %31s", bssName, path, eid) != 3) data/ion-3.2.1+dfsg/bss/test/bssrecv.c:380:10: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (sscanf(menuNav, "%19s %19s", fromTime, toTime) != 2) data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:956:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(bsoBECmd) > MAX_SDRSTRING ) data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:963:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(bsoRLCmd) > MAX_SDRSTRING ) data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1054:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(bsoBECmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/bssp/library/libbsspP.c:1073:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(bsoRLCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:153:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). length = read(fd, defaultReaderBuf, cfdpConstants->maxFileDataLength); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:186:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). length = read(fd, pktReaderBuf, cfdpConstants->maxFileDataLength); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:274:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). length = read(fd, textReaderBuf, cfdpConstants->maxFileDataLength); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:455:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHKERR(firstFileName == NULL || strlen(firstFileName) < 256); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:456:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHKERR(secondFileName == NULL || strlen(secondFileName) < 256); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:755:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (sourceFileName == NULL ? 0 : strlen(sourceFileName)); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:768:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (destFileName == NULL ? 0 : strlen(destFileName)); data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1138:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(sourceFileName) >= 256) data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1146:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(destFileName) >= 256) data/ion-3.2.1+dfsg/cfdp/library/libcfdp.c:1963:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). length = read(fd, buffer, length); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:905:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHKERR(firstFileName == NULL || strlen(firstFileName) < 256); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:906:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHKERR(secondFileName == NULL || strlen(secondFileName) < 256); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:907:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CHKERR(message == NULL || strlen(secondFileName) < 256); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1542:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). length = read(sourceFd, buf, 10000); data/ion-3.2.1+dfsg/cfdp/library/libcfdpP.c:1844:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(msgBuf) > 0) data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:639:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sourceFileNameLen = strlen(task->sourceFileName); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:647:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). destFileNameLen = strlen(task->destFileName); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1122:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int dirNameLen = strlen(opsData->directoryName); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1124:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(opsData->directoryDestFileName); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1170:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(opsData->directoryName) == 0 data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1171:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(opsData->directoryDestFileName) == 0) data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1205:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write(listing, listingLine, strlen(listingLine) + 1) < 0) data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1237:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). directoryNameLen = strlen(task->directoryName); data/ion-3.2.1+dfsg/cfdp/library/libcfdpops.c:1239:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). destFileNameLen = strlen(task->destFileName); data/ion-3.2.1+dfsg/cfdp/test/cfdptest.c:330:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tokens[1]) + 1)); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:405:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (hndl=0; hndl < NUM_TMP_FILES && strlen(tmp_files[hndl]); hndl++) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:410:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (hndl > TMP_MAX || hndl >= NUM_TMP_FILES || strlen(tmp_files[hndl])) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:416:5: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). oK(umask(S_IWGRP | S_IWOTH)); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:426:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp_files[hndl], tmp, 255); data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:432:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(tmp) + strlen(dir) + strlen("cfdp")+ 1 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:432:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(tmp) + strlen(dir) + strlen("cfdp")+ 1 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:432:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(tmp) + strlen(dir) + strlen("cfdp")+ 1 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:521:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(read(fd, &c, 1)<=0){ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:540:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(read(fd, &c, 1)<=0){ data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:561:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(buf)==0) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:826:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(t->sfile) + strlen(t->dfile) +strlen("cfdp")+ 10 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:826:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(t->sfile) + strlen(t->dfile) +strlen("cfdp")+ 10 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:826:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(t->sfile) + strlen(t->dfile) +strlen("cfdp")+ 10 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:923:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(t->sfile) + strlen(t->dfile) + strlen("cfdp")+ 10 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:923:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(t->sfile) + strlen(t->dfile) + strlen("cfdp")+ 10 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:923:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(t->sfile) + strlen(t->dfile) + strlen("cfdp")+ 10 >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1109:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (t->sfile[strlen(t->sfile)-1]=='/') data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1111:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t->sfile[strlen(t->sfile)-1]=0; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1113:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (t->dfile[strlen(t->dfile)-1]=='/') data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1115:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t->dfile[strlen(t->dfile)-1]=0; data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1146:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(t->sfile) + 1 + _D_EXACT_NAMLEN(dp) >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1207:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(t->sfile) + 1 + strlen(buff) >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1207:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(t->sfile) + 1 + strlen(buff) >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1285:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(t->dfile) + 1 + strlen(cwd+1) >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1285:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(t->dfile) + 1 + strlen(cwd+1) >= 255) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1603:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(t->shost)==0) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.c:1614:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(t->dhost)==0) data/ion-3.2.1+dfsg/cfdp/utils/bpcp.h:108:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define _D_EXACT_NAMLEN(d) (strlen ((d)->d_name)) data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:33:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dtn_eid.uri, endpoint_id.uri, DTN_MAX_ENDPOINT_ID); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:39:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bp_eid.uri, endpoint_id.uri, AL_BP_MAX_ENDPOINT_ID); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:105:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dtn_reginfo.script.script_val, reg_info.script.script_val, reg_info.script.script_len + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:128:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bp_reginfo.script.script_val, reg_info.script.script_val, reg_info.script.script_len + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:338:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dtn_bundle_payload.filename.filename_val, bundle_payload.filename.filename_val, bundle_payload.filename.filename_len + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_dtn_conversions.c:375:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bp_bundle_payload.filename.filename_val, bundle_payload.filename.filename_val, bundle_payload.filename.filename_len + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:189:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(schemeName,"ipn",4); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:191:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(schemeName,"dtn",4); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:334:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char * tmp_eid = (char *) malloc(sizeof(char) * (strlen(dlv.bundleSourceEid)+1)); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:396:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(ion_src)+1; data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:398:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ion_dst,ion_src,length); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:411:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(endpoint,str,strlen(str)+1); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion.c:411:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(endpoint,str,strlen(str)+1); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:34:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length_eid = strlen(endpoint_id.uri)+1; data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:36:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(eid_ion,endpoint_id.uri,length_eid); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:42:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(endpoint_id)+1; data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:43:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(eid_bp.uri,endpoint_id,length); data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:286:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). payload.filename.filename_len = strlen(filename)+1; data/ion-3.2.1+dfsg/contrib/dtnperf/al_bp/src/bp_implementations/al_bp_ion_conversions.c:287:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). payload.filename.filename_val = (char *)malloc(sizeof(char)*(strlen(filename)+1)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:361:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eid_len = strlen(opt->mon_eid); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:495:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). monitor_eid_len = strlen(opt->mon_eid); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:502:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = remaining; i > strlen(pattern); i -= strlen(pattern)) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:502:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = remaining; i > strlen(pattern); i -= strlen(pattern)) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:504:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(pattern, strlen(pattern), 1, f); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:505:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *bytes_written+=strlen(pattern); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:507:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *crc = calc_crc32_d8(*crc, (uint8_t*) pattern, strlen(pattern)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:509:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(pattern, remaining % strlen(pattern), 1, f); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:510:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *bytes_written+=remaining%strlen(pattern); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:512:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *crc = calc_crc32_d8(*crc, (uint8_t*) pattern, remaining % strlen(pattern)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:595:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eid_len = strlen(ack.bundle_source.uri); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/bundle_tools.c:692:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ext_block->block.data.data_val, buf, len); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:25:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(buf, strlen(buf), 1, file); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:32:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(buf, strlen(buf), 1, file); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:39:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(buf, strlen(buf), 1, file); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:58:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(buf, strlen(buf), 1, file); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:107:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(buf1, ";"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:109:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(buf1, strlen(buf1), 1, file); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:131:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (buf[strlen(buf) -1] != ';') data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:132:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(buf, ";"); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/csv_tools.c:133:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(buf, strlen(buf), 1, file); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:188:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). client_demux_string = malloc (strlen(CLI_EP_STRING) + 10); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:227:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(perf_opt->mon_eid) == 0) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:235:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(perf_opt->mon_eid, local_eid.uri, ptr - local_eid.uri); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:245:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(perf_opt->mon_eid, temp, strlen(temp)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:245:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(perf_opt->mon_eid, temp, strlen(temp)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:354:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). header_size = get_header_size(perf_opt->op_mode, strlen(perf_opt->F_arg), strlen(perf_opt->mon_eid) ); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:354:77: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). header_size = get_header_size(perf_opt->op_mode, strlen(perf_opt->F_arg), strlen(perf_opt->mon_eid) ); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:356:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). header_size = get_header_size(perf_opt->op_mode, 0, strlen(perf_opt->mon_eid) ); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:479:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). transfer_filename = malloc(strlen(temp2) + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:483:101: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tot_bundles += bundles_needed(transfer_filedim, get_file_fragment_size(perf_opt->bundle_payload, strlen(transfer_filename), strlen(perf_opt->mon_eid))); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:483:128: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tot_bundles += bundles_needed(transfer_filedim, get_file_fragment_size(perf_opt->bundle_payload, strlen(transfer_filename), strlen(perf_opt->mon_eid))); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:772:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp_payload.filename.filename_len = strlen(file_bundle_names[i]); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:864:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). error = al_bp_bundle_set_payload_file(&bundle, source_file, strlen(source_file)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1030:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). error = al_bp_bundle_set_payload_file(&bundle, source_file, strlen(source_file)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1630:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(perf_opt->dest_eid, optarg, AL_BP_MAX_ENDPOINT_ID); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1634:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(perf_opt->mon_eid, optarg, AL_BP_MAX_ENDPOINT_ID); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_client.c:1924:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). block_buf, strlen(block_buf)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:101:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). command = malloc(sizeof(char) * (10 + strlen(perf_opt->logs_dir))); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:402:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename_len = strlen(relative_source_addr.uri) - strlen("ipn:") + 15; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:402:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename_len = strlen(relative_source_addr.uri) - strlen("ipn:") + 15; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:406:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename_len = strlen(relative_source_addr.uri) - strlen("dtn://") + 15; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:406:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename_len = strlen(relative_source_addr.uri) - strlen("dtn://") + 15; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:411:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(temp, relative_source_addr.uri, strlen(relative_source_addr.uri) + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:411:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(temp, relative_source_addr.uri, strlen(relative_source_addr.uri) + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:429:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_filename = (char *) malloc(strlen(perf_opt->logs_dir) + strlen(filename) + 2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_monitor.c:429:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_filename = (char *) malloc(strlen(perf_opt->logs_dir) + strlen(filename) + 2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:147:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). command = malloc(sizeof(char) * (10 + strlen(perf_opt->dest_dir))); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:168:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). command = malloc(sizeof(char) * (10 + strlen(perf_opt->file_dir))); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:679:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp_eid = (char *) malloc(sizeof(char) * strlen(bundle_source_addr.uri)+1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:694:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename_ack_len = strlen(filename_ack)+1; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:894:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* filename = (char*) malloc(item->info->filename_len + strlen(item->info->full_dir) +1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/dtnperf_modes/dtnperf_server.c:1148:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* filename = (char*) malloc(item->info->filename_len + strlen(item->info->full_dir) +1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:55:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). info->full_dir = (char*) malloc(strlen(full_dir) + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:56:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info->full_dir, full_dir, strlen(full_dir) + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:56:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(info->full_dir, full_dir, strlen(full_dir) + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:58:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info->filename, filename, filename_len +1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:185:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* filename = (char*) malloc(info->filename_len + strlen(info->full_dir) +1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:270:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(temp, client_eid.uri, strlen(client_eid.uri) + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:270:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(temp, client_eid.uri, strlen(client_eid.uri) + 1); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:282:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_dir = (char*) malloc(strlen(dir) + strlen(eid) + 20); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:282:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_dir = (char*) malloc(strlen(dir) + strlen(eid) + 20); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:301:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fseek(pl_stream, sizeof(filename_len) + strlen(info->filename), SEEK_CUR); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:349:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint16_t filename_len = strlen(filename); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:350:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint16_t monitor_eid_len = strlen(opt->mon_eid); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/file_transfer_tools.c:360:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytes_read = read(fd, fragment, fragment_len); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:306:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). k = strlen(s) - 1; data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:307:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). temp = malloc(strlen(s)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:321:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (k != (int)strlen(temp)) data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:379:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(cmd_exe, cmd_args, strlen(cmd_args)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:379:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(cmd_exe, cmd_args, strlen(cmd_args)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:385:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). item_len = strlen(item->d_name); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:403:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). length = read(fd, buf, sizeof(buf)); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:438:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(cmdline_exe, cmdline_args, sizeof(cmdline_exe) - strlen(cmdline_exe) - 2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:438:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(cmdline_exe, cmdline_args, sizeof(cmdline_exe) - strlen(cmdline_exe) - 2); data/ion-3.2.1+dfsg/contrib/dtnperf/dtnperf/src/utils.c:440:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(cmdline_exe, cmd_exe, strlen(cmd_exe)) == 0) data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:128:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eofLineLen = strlen(eofLine); data/ion-3.2.1+dfsg/dgr/test/file2dgr.c:180:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLen = strlen(line); data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:235:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eofLineLen = strlen(eofLine); data/ion-3.2.1+dfsg/dgr/test/file2tcp.c:280:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLen = strlen(line); data/ion-3.2.1+dfsg/dgr/test/file2udp.c:425:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). eofLineLen = strlen(eofLine); data/ion-3.2.1+dfsg/dgr/test/file2udp.c:461:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLen = strlen(line); data/ion-3.2.1+dfsg/dgr/test/tcp2file.c:31:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytesRead = read(*sock, into, length); data/ion-3.2.1+dfsg/dtpc/library/libdtpcP.c:671:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(dstEid) == 8 && strcmp(dstEid, "dtn:none") == 0) data/ion-3.2.1+dfsg/ici/library/ion.c:358:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textLen = strlen(msgbuf); data/ion-3.2.1+dfsg/ici/library/ionsec.c:89:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/library/ionsec.c:89:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/library/ionsec.c:91:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/library/ionsec.c:91:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/library/ionsec.c:1415:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytesRead = read(keyfd, cursor, length); data/ion-3.2.1+dfsg/ici/library/ionsec.c:1783:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (eidsMatch(eidBuffer, eidLen, destEid, strlen(destEid))) data/ion-3.2.1+dfsg/ici/library/ionsec.c:1789:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(srcEid))) data/ion-3.2.1+dfsg/ici/library/ionsec.c:1928:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(keyName) > 31) data/ion-3.2.1+dfsg/ici/library/ionsec.c:2052:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(secDestEid)))) data/ion-3.2.1+dfsg/ici/library/ionsec.c:2058:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(secSrcEid)) == 1) data/ion-3.2.1+dfsg/ici/library/ionsec.c:2295:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(secDestEid)))) data/ion-3.2.1+dfsg/ici/library/ionsec.c:2301:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(secSrcEid)) == 1) data/ion-3.2.1+dfsg/ici/library/ionsec.c:2352:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ciphersuiteName) > 31) data/ion-3.2.1+dfsg/ici/library/ionsec.c:2358:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(keyName) > 31) data/ion-3.2.1+dfsg/ici/library/ionsec.c:2420:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ciphersuiteName) > 31) data/ion-3.2.1+dfsg/ici/library/ionsec.c:2426:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(keyName) > 31) data/ion-3.2.1+dfsg/ici/library/platform.c:337:7: [1] (free) memalign: On some systems (though not Linux-based systems) an attempt to free() results from memalign() may fail. This may, on a few systems, be exploitable. Also note that memalign() may not check that the boundary parameter is correct (CWE-676). Use posix_memalign instead (defined in POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD 4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases, malloc()'s alignment may be sufficient. void *memalign(size_t boundary, size_t size) data/ion-3.2.1+dfsg/ici/library/platform.c:588:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, name.nodename, bufferLength - 1); data/ion-3.2.1+dfsg/ici/library/platform.c:653:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, hostInfo->h_name, MAXHOSTNAMELEN); data/ion-3.2.1+dfsg/ici/library/platform.c:738:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, hostInfo->h_name, MAXHOSTNAMELEN); data/ion-3.2.1+dfsg/ici/library/platform.c:892:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, hostInfo->h_name, MAXHOSTNAMELEN); data/ion-3.2.1+dfsg/ici/library/platform.c:1044:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, hostInfo->h_name, MAXHOSTNAMELEN); data/ion-3.2.1+dfsg/ici/library/platform.c:1264:10: [1] (free) memalign: On some systems (though not Linux-based systems) an attempt to free() results from memalign() may fail. This may, on a few systems, be exploitable. Also note that memalign() may not check that the boundary parameter is correct (CWE-676). Use posix_memalign instead (defined in POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD 4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases, malloc()'s alignment may be sufficient. block = memalign((size_t) (sizeof(void *)), size); data/ion-3.2.1+dfsg/ici/library/platform.c:1414:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msgLength = strlen(errmsgs); data/ion-3.2.1+dfsg/ici/library/platform.c:1443:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). spaceForText = 8 + strlen(lineNbrBuffer) + 4 + strlen(fileName) data/ion-3.2.1+dfsg/ici/library/platform.c:1443:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). spaceForText = 8 + strlen(lineNbrBuffer) + 4 + strlen(fileName) data/ion-3.2.1+dfsg/ici/library/platform.c:1444:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + 2 + strlen(text); data/ion-3.2.1+dfsg/ici/library/platform.c:1448:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). spaceNeeded += (2 + strlen(arg) + 1); data/ion-3.2.1+dfsg/ici/library/platform.c:1508:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textLength = strlen(text); data/ion-3.2.1+dfsg/ici/library/platform.c:1510:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). maxTextLength = sizeof textBuffer - (2 + strlen(sysmsg) + 1); data/ion-3.2.1+dfsg/ici/library/platform.c:2221:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hostname) != 0) data/ion-3.2.1+dfsg/ici/library/platform.c:2517:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). numLen = strlen(scratchpad); data/ion-3.2.1+dfsg/ici/library/platform.c:2546:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). numLen = strlen(scratchpad); data/ion-3.2.1+dfsg/ici/library/platform.c:2647:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fieldLength = strlen(sval); data/ion-3.2.1+dfsg/ici/library/platform.c:2716:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fieldLength = strlen(scratchpad); data/ion-3.2.1+dfsg/ici/library/platform.c:3003:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). switch (read(fd, cursor, 1)) data/ion-3.2.1+dfsg/ici/library/platform.c:3079:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(string); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:553:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). argLen = strlen(arg); data/ion-3.2.1+dfsg/ici/library/platform_sm.c:3161:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(commandLine); data/ion-3.2.1+dfsg/ici/library/psm.c:253:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) > 31) data/ion-3.2.1+dfsg/ici/library/psm.c:514:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen(name) > 32) data/ion-3.2.1+dfsg/ici/library/sptrace.c:70:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((nameLen = strlen(name)) < 1 || nameLen > 31) data/ion-3.2.1+dfsg/ici/library/sptrace.c:163:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((nameLen = strlen(name)) < 1 || nameLen > 31) data/ion-3.2.1+dfsg/ici/library/sptrace.c:239:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buflen = strlen(sourceFileName) + 1; data/ion-3.2.1+dfsg/ici/library/sptrace.c:289:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buflen = strlen(msg) + 1; data/ion-3.2.1+dfsg/ici/library/sptrace.c:418:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buffer); data/ion-3.2.1+dfsg/ici/library/sptrace.c:427:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buffer); data/ion-3.2.1+dfsg/ici/library/sptrace.c:438:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buffer); data/ion-3.2.1+dfsg/ici/library/sptrace.c:463:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buffer); data/ion-3.2.1+dfsg/ici/library/sptrace.c:474:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buffer); data/ion-3.2.1+dfsg/ici/library/zco.c:381:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathLen = strlen(pathName); data/ion-3.2.1+dfsg/ici/library/zco.c:402:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cwdLen = strlen(pathBuf); data/ion-3.2.1+dfsg/ici/library/zco.c:421:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). scriptLen = strlen(cleanupScript); data/ion-3.2.1+dfsg/ici/library/zco.c:496:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathLen = strlen(pathName); data/ion-3.2.1+dfsg/ici/library/zco.c:517:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cwdLen = strlen(pathBuf); data/ion-3.2.1+dfsg/ici/library/zco.c:536:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). scriptLen = strlen(cleanupScript); data/ion-3.2.1+dfsg/ici/library/zco.c:1559:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytesRead = read(fd, buffer, bytesAvbl); data/ion-3.2.1+dfsg/ici/sdr/sdrcatlg.c:62:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (object == 0 || name == NULL || strlen(name) > MAX_SDR_NAME) data/ion-3.2.1+dfsg/ici/sdr/sdrcatlg.c:139:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). XNCHKZERO(!(name == NULL || strlen(name) > MAX_SDR_NAME)); data/ion-3.2.1+dfsg/ici/sdr/sdrstring.c:53:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (from == NULL || (length = strlen(from)) > 255) data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:596:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). || read(logfile, (char *) logEntryControl, length) < length) data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:607:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(logfile, dbsm + logEntryControl[0], length) data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:643:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(logfile, buf, length) < length) data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:852:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). lengthRead = read(logfile, (char *) logEntryControl, length); data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1205:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(dbfile, dbsm, sdr->sdrSize) data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1242:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(dbfile, dbsm, sdr->sdrSize) data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1866:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). || read(sdrv->dbfile, buffer, length) < length) data/ion-3.2.1+dfsg/ici/sdr/sdrxn.c:1968:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). || read(sdrv->dbfile, into, length) < length) data/ion-3.2.1+dfsg/ici/test/file2sm.c:107:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLen = strlen(eofLine) + 1; data/ion-3.2.1+dfsg/ici/test/file2sm.c:146:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLen = strlen(line) + 1; data/ion-3.2.1+dfsg/ici/test/owltsim.c:383:11: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. switch (fscanf(configFile, "%32s %32s %hu %255s %hu %hu %hu", data/ion-3.2.1+dfsg/ici/test/owlttb.c:102:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytesRead = read(sock, into, length); data/ion-3.2.1+dfsg/ici/utils/ionadmin.c:682:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newAlarmScript) > 255) data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:211:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cursor) != (datLen * 2)) data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:693:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:693:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:695:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:695:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:711:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:711:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:713:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/utils/ionsecadmin.c:713:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isprintf(buf + strlen(buf), sizeof buf - strlen(buf), data/ion-3.2.1+dfsg/ici/utils/killm.c:106:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) <= 13) data/ion-3.2.1+dfsg/ltp/library/libltpP.c:951:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(lsoCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/ltp/library/libltpP.c:1058:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(lsoCmd) > MAX_SDRSTRING) data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:796:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(ptrs[num-1]) + /* length of last string */ data/ion-3.2.1+dfsg/nm/agent/adm_bp_priv.c:860:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result.length = (uint64_t) strlen(endpoint.eid) + 1; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:310:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result.length = (uint64_t) strlen(induct.inductName) + 1; data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:540:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(ptrs[num-1]) + /* length of last string */ data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:573:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(ptrs[num-1]) + /* length of last string */ data/ion-3.2.1+dfsg/nm/agent/adm_ion_priv.c:642:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result.length = (uint64_t) strlen(outduct.outductName) + 1; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr.c:359:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(agent->agent_eid.name, in_eid->name, MAX_EID_LEN); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1028:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(oid_root) + parms_size; data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1276:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(eid.name, row[1], MAX_EID_LEN); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_db.c:1647:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result_size = strlen(result_data); data/ion-3.2.1+dfsg/nm/mgr/nm_mgr_ui.c:654:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(mid_str); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:107:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) > ADM_MAX_NAME) data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:122:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((char *)new_entry->name, name, ADM_MAX_NAME); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:251:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) > ADM_MAX_NAME) data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:266:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((char *)new_entry->name, name, ADM_MAX_NAME); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:485:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(value) + 1; data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:665:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(memcmp(name, cur->name, strlen(cur->name)) == 0) data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:840:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(memcmp(name, cur->name, strlen(cur->name)) == 0) data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:968:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char*) buffer); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1070:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_ptr += strlen((char*)buf_ptr) + 1; data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1341:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char*) buffer); data/ion-3.2.1+dfsg/nm/shared/adm/adm.c:1399:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp = strlen((char *)cursor) + 1; data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:200:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:213:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:217:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:229:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:233:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:243:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:253:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:265:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:275:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:280:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:288:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:292:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:316:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:320:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_bp.c:340:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(result,temp,256); data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:204:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *str_len = (temp_size * 5) + (25 * 100) + strlen(induct.inductName); data/ion-3.2.1+dfsg/nm/shared/adm/adm_ion.c:242:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *str_len = (temp_size * 5) + (25 * 100) + strlen(outduct.outductName); data/ion-3.2.1+dfsg/nm/shared/msg/msg_admin.c:73:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int id_len = strlen(msg->agent_id.name); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:769:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oid_size = strlen((char *)oid_str) + 1; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:774:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oid_size = strlen("NULL_OID") + 1; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:778:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy((char *)oid_str,"NULL OID",oid_size); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:793:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). raw_size = strlen("NO RAW!") + 1; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:797:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(raw_str,"NO RAW!", raw_size); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:811:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). raw_size = strlen((char*)raw_str) + 1; data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1429:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tot_size += strlen(mid_strs[i]); data/ion-3.2.1+dfsg/nm/shared/primitives/mid.c:1549:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tot_size += strlen(mid_strs[i]); data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:86:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(s) > (sizeof(unsigned long) * 2)) data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:95:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(i = strlen(s)-1; i >= 0; i--) data/ion-3.2.1+dfsg/nm/shared/utils/utils.c:847:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char*)value); data/ion-3.2.1+dfsg/tests/issue-279-bpMemo-timeline/driver.c:19:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int payloadSize = strlen(testLine) + 1; ANALYSIS SUMMARY: Hits = 2266 Lines analyzed = 199530 in approximately 4.68 seconds (42609 lines/second) Physical Source Lines of Code (SLOC) = 141900 Hits@level = [0] 1123 [1] 425 [2] 1678 [3] 26 [4] 137 [5] 0 Hits@level+ = [0+] 3389 [1+] 2266 [2+] 1841 [3+] 163 [4+] 137 [5+] 0 Hits/KSLOC@level+ = [0+] 23.883 [1+] 15.969 [2+] 12.9739 [3+] 1.1487 [4+] 0.965469 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.