Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/linuxinfo-3.3.1/linuxinfo_sparc.c Examining data/linuxinfo-3.3.1/linuxinfo_unknown.c Examining data/linuxinfo-3.3.1/linuxinfo_avr.c Examining data/linuxinfo-3.3.1/linuxinfo_common.c Examining data/linuxinfo-3.3.1/linuxinfo_m68k.c Examining data/linuxinfo-3.3.1/linuxinfo_alpha.c Examining data/linuxinfo-3.3.1/linuxinfo_ia64.c Examining data/linuxinfo-3.3.1/linuxinfo_hppa.c Examining data/linuxinfo-3.3.1/linuxinfo_sh.c Examining data/linuxinfo-3.3.1/linuxinfo_arm.c Examining data/linuxinfo-3.3.1/linuxinfo_intel.c Examining data/linuxinfo-3.3.1/linuxinfo.h Examining data/linuxinfo-3.3.1/linuxinfo_ppc.c Examining data/linuxinfo-3.3.1/linuxinfo.c Examining data/linuxinfo-3.3.1/linuxinfo_s390.c Examining data/linuxinfo-3.3.1/linuxinfo_mips.c FINAL RESULTS: data/linuxinfo-3.3.1/linuxinfo.c:124:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(ngettext("processor", "processors", hw.hw_processors)); data/linuxinfo-3.3.1/linuxinfo_alpha.c:47:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, temp_string2); data/linuxinfo-3.3.1/linuxinfo_alpha.c:75:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_alpha.c:78:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "Alpha %s", model); data/linuxinfo-3.3.1/linuxinfo_arm.c:77:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vendor, implementer[++i]); data/linuxinfo-3.3.1/linuxinfo_arm.c:88:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model,temp_string2); // v .. instruction set data/linuxinfo-3.3.1/linuxinfo_arm.c:104:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_arm.c:108:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s", vendor); data/linuxinfo-3.3.1/linuxinfo_arm.c:112:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s", vendor); data/linuxinfo-3.3.1/linuxinfo_arm.c:116:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s v%s instruction set", vendor, model); data/linuxinfo-3.3.1/linuxinfo_avr.c:43:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chip, temp_string2); data/linuxinfo-3.3.1/linuxinfo_avr.c:47:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(family, temp_string2); data/linuxinfo-3.3.1/linuxinfo_avr.c:51:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(clock, temp_string2); data/linuxinfo-3.3.1/linuxinfo_avr.c:57:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_avr.c:59:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s %s", family, chip); data/linuxinfo-3.3.1/linuxinfo_avr.c:65:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_megahertz, "%s", clock); data/linuxinfo-3.3.1/linuxinfo_common.c:48:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(os->os_hostname, buf.nodename); data/linuxinfo-3.3.1/linuxinfo_common.c:49:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(os->os_name, buf.sysname); data/linuxinfo-3.3.1/linuxinfo_common.c:50:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(os->os_version, buf.release); data/linuxinfo-3.3.1/linuxinfo_common.c:51:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(os->os_revision, buf.version); data/linuxinfo-3.3.1/linuxinfo_common.c:132:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(second_string, p); data/linuxinfo-3.3.1/linuxinfo_hppa.c:97:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(family, temp_string2); data/linuxinfo-3.3.1/linuxinfo_hppa.c:101:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chip, temp_string2); data/linuxinfo-3.3.1/linuxinfo_hppa.c:102:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, temp_string2); data/linuxinfo-3.3.1/linuxinfo_hppa.c:119:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_hppa.c:122:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s", model); data/linuxinfo-3.3.1/linuxinfo_ia64.c:84:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vendor, vendors[++i]); data/linuxinfo-3.3.1/linuxinfo_ia64.c:97:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, family); data/linuxinfo-3.3.1/linuxinfo_ia64.c:105:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, models[++i]); data/linuxinfo-3.3.1/linuxinfo_ia64.c:114:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(family, temp_string2); data/linuxinfo-3.3.1/linuxinfo_ia64.c:129:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_ia64.c:132:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s %s", vendor, model); data/linuxinfo-3.3.1/linuxinfo_intel.c:257:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vendor, vendors[++i]); data/linuxinfo-3.3.1/linuxinfo_intel.c:279:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, models[++i]); data/linuxinfo-3.3.1/linuxinfo_intel.c:287:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(family, temp_string2); data/linuxinfo-3.3.1/linuxinfo_intel.c:302:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_intel.c:304:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s %s", vendor, model); data/linuxinfo-3.3.1/linuxinfo_m68k.c:50:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chip, temp_string2); data/linuxinfo-3.3.1/linuxinfo_m68k.c:53:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(megahertz, temp_string2); data/linuxinfo-3.3.1/linuxinfo_m68k.c:63:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_m68k.c:66:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s", chip); data/linuxinfo-3.3.1/linuxinfo_m68k.c:74:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hw->hw_megahertz, megahertz); data/linuxinfo-3.3.1/linuxinfo_mips.c:52:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fpu, pos); data/linuxinfo-3.3.1/linuxinfo_mips.c:56:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chip, temp_string2); data/linuxinfo-3.3.1/linuxinfo_mips.c:70:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_mips.c:75:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fullchip, "%s (%s)",chip,fpu); data/linuxinfo-3.3.1/linuxinfo_mips.c:79:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullchip,chip); data/linuxinfo-3.3.1/linuxinfo_mips.c:83:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s %s", endian,fullchip); data/linuxinfo-3.3.1/linuxinfo_mips.c:87:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s", fullchip); data/linuxinfo-3.3.1/linuxinfo_ppc.c:48:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (processors == 0) strcpy(chip, temp_string2); data/linuxinfo-3.3.1/linuxinfo_ppc.c:53:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vendor, temp_string2); data/linuxinfo-3.3.1/linuxinfo_ppc.c:56:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vendor, temp_string2); data/linuxinfo-3.3.1/linuxinfo_ppc.c:72:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_ppc.c:80:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s %s", chip, vendor); data/linuxinfo-3.3.1/linuxinfo_s390.c:59:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vendor, temp_string2); data/linuxinfo-3.3.1/linuxinfo_s390.c:74:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s", vendor); data/linuxinfo-3.3.1/linuxinfo_sh.c:48:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chip, temp_string2); data/linuxinfo-3.3.1/linuxinfo_sh.c:52:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(family, temp_string2); data/linuxinfo-3.3.1/linuxinfo_sh.c:56:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(clock, temp_string2); data/linuxinfo-3.3.1/linuxinfo_sh.c:62:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_sh.c:64:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s %s", family, chip); data/linuxinfo-3.3.1/linuxinfo_sh.c:70:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_megahertz, "%s", clock); data/linuxinfo-3.3.1/linuxinfo_sparc.c:85:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vendor, vendors[++i]); data/linuxinfo-3.3.1/linuxinfo_sparc.c:94:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, models[++i]); data/linuxinfo-3.3.1/linuxinfo_sparc.c:110:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, getphysicalmemory()); data/linuxinfo-3.3.1/linuxinfo_sparc.c:114:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s %s", vendor, model); data/linuxinfo-3.3.1/linuxinfo_unknown.c:26:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hw->hw_memory, LONGSPEC, 0); data/linuxinfo-3.3.1/linuxinfo_unknown.c:30:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hw->hw_cpuinfo, "%s", "Unknown"); data/linuxinfo-3.3.1/linuxinfo.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ordinals[13][10] = { __("Unknown"), __("One"), __("Two"), __("Three"), __("Four"), __("Five"), __("Six"), __("Seven"), __("Eight"), __("Nine"), __("Ten"), __("Eleven"), __("Twelve") }; data/linuxinfo-3.3.1/linuxinfo.c:86:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cpuinfo_fd = open(argv[1], O_RDONLY); data/linuxinfo-3.3.1/linuxinfo.c:95:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cpuinfo_fd = open(CPUINFO_FILE, O_RDONLY); data/linuxinfo-3.3.1/linuxinfo.h:116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char os_hostname[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo.h:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char os_name[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo.h:118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char os_version[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo.h:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char os_revision[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo.h:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hw_cpuinfo[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo.h:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hw_bogomips[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo.h:126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hw_memory[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo.h:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hw_megahertz[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo.h:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lib_version[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_alpha.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_alpha.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ], vendor[BUFSIZ], model[BUFSIZ] = "Unknown"; data/linuxinfo-3.3.1/linuxinfo_alpha.c:63:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_megahertz, "%.2f", megahertz); data/linuxinfo-3.3.1/linuxinfo_alpha.c:71:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). processors = atoi(temp_string2); data/linuxinfo-3.3.1/linuxinfo_alpha.c:82:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_arm.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_arm.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ], vendor[BUFSIZ], model[BUFSIZ], Mhz[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_arm.c:47:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(chip, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_arm.c:48:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vendor, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_arm.c:49:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(model, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_arm.c:62:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vendor, "Intel"); data/linuxinfo-3.3.1/linuxinfo_arm.c:63:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(model, "SA110"); data/linuxinfo-3.3.1/linuxinfo_arm.c:95:15: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tempMHz = atol(temp_string2); data/linuxinfo-3.3.1/linuxinfo_arm.c:123:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_arm.c:128:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_megahertz, "%d", (int)tempMHz); data/linuxinfo-3.3.1/linuxinfo_avr.c:28:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_avr.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ] = "Unknown"; data/linuxinfo-3.3.1/linuxinfo_avr.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char family[BUFSIZ]="Unknown"; data/linuxinfo-3.3.1/linuxinfo_avr.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clock[BUFSIZ]="Unknown"; data/linuxinfo-3.3.1/linuxinfo_avr.c:63:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_common.c:53:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(os->os_hostname, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_common.c:54:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(os->os_name, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_common.c:55:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(os->os_version, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_common.c:56:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(os->os_revision, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_common.c:77:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(lib->lib_version, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_common.c:95:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lib->lib_version, "%d.%d.%d", libc_major, libc_minor, libc_teeny); data/linuxinfo-3.3.1/linuxinfo_common.c:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_common.c:144:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). meminfo_fd = open(MEMINFO_FILE, O_RDONLY); data/linuxinfo-3.3.1/linuxinfo_common.c:159:30: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). memory = (LONGLONG)atol(temp_string2); data/linuxinfo-3.3.1/linuxinfo_hppa.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ], model[BUFSIZ], Mhz[BUFSIZ], family[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_hppa.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_hppa.c:64:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(chip, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_hppa.c:65:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(model, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_hppa.c:66:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(family, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_hppa.c:107:9: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atol(temp_string2) > tempMHz) data/linuxinfo-3.3.1/linuxinfo_hppa.c:108:16: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tempMHz = atol(temp_string2); data/linuxinfo-3.3.1/linuxinfo_hppa.c:127:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_hppa.c:132:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_megahertz, "%d", (int)tempMHz); data/linuxinfo-3.3.1/linuxinfo_ia64.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ], vendor[BUFSIZ], model[BUFSIZ], Mhz[BUFSIZ], family[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_ia64.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_ia64.c:65:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(chip, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_ia64.c:66:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vendor, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_ia64.c:67:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(model, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_ia64.c:68:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(family, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_ia64.c:118:9: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atol(temp_string2) > tempMHz) data/linuxinfo-3.3.1/linuxinfo_ia64.c:119:16: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tempMHz = atol(temp_string2); data/linuxinfo-3.3.1/linuxinfo_ia64.c:137:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_ia64.c:142:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_megahertz, "%d", (int)tempMHz); data/linuxinfo-3.3.1/linuxinfo_intel.c:229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ], vendor[BUFSIZ], model[BUFSIZ], Mhz[BUFSIZ], family[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_intel.c:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_intel.c:238:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(chip, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_intel.c:239:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vendor, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_intel.c:240:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(model, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_intel.c:241:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(family, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_intel.c:291:9: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atol(temp_string2) > tempMHz) data/linuxinfo-3.3.1/linuxinfo_intel.c:292:16: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tempMHz = atol(temp_string2); data/linuxinfo-3.3.1/linuxinfo_intel.c:310:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case '4': sprintf(hw->hw_cpuinfo, "Unknown 486"); data/linuxinfo-3.3.1/linuxinfo_intel.c:318:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_intel.c:323:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_megahertz, "%d", (int)tempMHz); data/linuxinfo-3.3.1/linuxinfo_m68k.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_m68k.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ] = "Unknown"; data/linuxinfo-3.3.1/linuxinfo_m68k.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char megahertz[BUFSIZ]="?"; data/linuxinfo-3.3.1/linuxinfo_m68k.c:70:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_mips.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_mips.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ] = "Unknown"; data/linuxinfo-3.3.1/linuxinfo_mips.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char endian[BUFSIZ]="Unknown"; data/linuxinfo-3.3.1/linuxinfo_mips.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fpu[BUFSIZ]="FPU Unknown"; data/linuxinfo-3.3.1/linuxinfo_mips.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullchip[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_mips.c:93:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_ppc.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_ppc.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ], vendor[BUFSIZ], model[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_ppc.c:60:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(temp_string2) > megahertz) data/linuxinfo-3.3.1/linuxinfo_ppc.c:62:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). megahertz = atoi(temp_string2); data/linuxinfo-3.3.1/linuxinfo_ppc.c:76:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_megahertz, "%d", megahertz); data/linuxinfo-3.3.1/linuxinfo_ppc.c:84:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f",tempbogo * processors); data/linuxinfo-3.3.1/linuxinfo_s390.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_s390.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ], vendor[BUFSIZ], model[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_s390.c:62:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). processors = atoi(temp_string2); data/linuxinfo-3.3.1/linuxinfo_s390.c:71:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_memory, "%ld", memory); data/linuxinfo-3.3.1/linuxinfo_s390.c:78:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f",tempbogo * processors); data/linuxinfo-3.3.1/linuxinfo_sh.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_sh.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ] = "Unknown"; data/linuxinfo-3.3.1/linuxinfo_sh.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char family[BUFSIZ]="Unknown"; data/linuxinfo-3.3.1/linuxinfo_sh.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clock[BUFSIZ]="Unknown"; data/linuxinfo-3.3.1/linuxinfo_sh.c:68:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", bogomips); data/linuxinfo-3.3.1/linuxinfo_sparc.c:68:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[BUFSIZ], temp_string2[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_sparc.c:69:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chip[BUFSIZ], vendor[BUFSIZ], model[BUFSIZ]; data/linuxinfo-3.3.1/linuxinfo_sparc.c:71:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(chip, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_sparc.c:72:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(vendor, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_sparc.c:73:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(model, "Unknown"); data/linuxinfo-3.3.1/linuxinfo_sparc.c:118:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f",tempbogo * processors); data/linuxinfo-3.3.1/linuxinfo_unknown.c:31:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hw->hw_bogomips, "%0.2f", 0.0); data/linuxinfo-3.3.1/linuxinfo.c:120:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(hw.hw_megahertz, "?", strlen("?")) != 0) data/linuxinfo-3.3.1/linuxinfo_alpha.c:46:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu model", strlen("cpu model")))) data/linuxinfo-3.3.1/linuxinfo_alpha.c:49:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "BogoMIPS", strlen("BogoMIPS")))) data/linuxinfo-3.3.1/linuxinfo_alpha.c:56:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cycle frequency [Hz]", strlen("cycle frequency [Hz]")))) data/linuxinfo-3.3.1/linuxinfo_alpha.c:65:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(hw->hw_megahertz, "?"); data/linuxinfo-3.3.1/linuxinfo_alpha.c:67:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpus active", strlen("cpus active")))) data/linuxinfo-3.3.1/linuxinfo_alpha.c:80:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_arm.c:57:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "Processor", strlen("Processor")) == 0) data/linuxinfo-3.3.1/linuxinfo_arm.c:60:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string2, "Intel sa110", strlen("Intel sa110")) == 0) data/linuxinfo-3.3.1/linuxinfo_arm.c:68:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "CPU implementer", strlen("CPU implementer")) == 0) data/linuxinfo-3.3.1/linuxinfo_arm.c:75:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string2, implementer[i], strlen(implementer[i])) == 0) data/linuxinfo-3.3.1/linuxinfo_arm.c:86:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "CPU architecture", strlen("CPU architecture")) == 0) data/linuxinfo-3.3.1/linuxinfo_arm.c:91:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "Type", strlen("Type")) == 0) data/linuxinfo-3.3.1/linuxinfo_arm.c:94:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "cpu MHz", strlen("cpu MHz")) == 0) data/linuxinfo-3.3.1/linuxinfo_arm.c:97:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "BogoMips", strlen("BogoMips")) == 0) data/linuxinfo-3.3.1/linuxinfo_arm.c:121:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_arm.c:126:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(hw->hw_megahertz, "?"); data/linuxinfo-3.3.1/linuxinfo_avr.c:38:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "processor", strlen("processor")) == 0) data/linuxinfo-3.3.1/linuxinfo_avr.c:42:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu type", strlen("cpu type"))) || !(strncmp(temp_string, "cpu core", strlen("cpu core")))) data/linuxinfo-3.3.1/linuxinfo_avr.c:42:101: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu type", strlen("cpu type"))) || !(strncmp(temp_string, "cpu core", strlen("cpu core")))) data/linuxinfo-3.3.1/linuxinfo_avr.c:46:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu family", strlen("cpu family"))) || !(strncmp(temp_string, "cpu arch", strlen("cpu arch")))) data/linuxinfo-3.3.1/linuxinfo_avr.c:46:105: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu family", strlen("cpu family"))) || !(strncmp(temp_string, "cpu arch", strlen("cpu arch")))) data/linuxinfo-3.3.1/linuxinfo_avr.c:50:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "bogomips", strlen("bogomips")))) { data/linuxinfo-3.3.1/linuxinfo_avr.c:61:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_common.c:102:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int len = read(fd, buffer, length); data/linuxinfo-3.3.1/linuxinfo_common.c:156:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strncmp(temp_string, "MemTota", strlen("MemTota")) == 0)&&!found) data/linuxinfo-3.3.1/linuxinfo_common.c:178:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(find); data/linuxinfo-3.3.1/linuxinfo_common.c:217:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). subject_length = strlen((char *)subject); data/linuxinfo-3.3.1/linuxinfo_hppa.c:72:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "processor", strlen("processor")) == 0) data/linuxinfo-3.3.1/linuxinfo_hppa.c:96:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "family", strlen("cpu family")) == 0) data/linuxinfo-3.3.1/linuxinfo_hppa.c:99:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "cpu ", strlen("cpu ")) == 0) data/linuxinfo-3.3.1/linuxinfo_hppa.c:105:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "cpu MHz", strlen("cpu MHz")) == 0) data/linuxinfo-3.3.1/linuxinfo_hppa.c:111:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "bogomips", strlen("bogomips")) == 0) data/linuxinfo-3.3.1/linuxinfo_hppa.c:125:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_hppa.c:130:3: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_megahertz, "?"); data/linuxinfo-3.3.1/linuxinfo_ia64.c:74:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "processor", strlen("processor")) == 0) data/linuxinfo-3.3.1/linuxinfo_ia64.c:77:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "vendor", strlen("vendor")) == 0) data/linuxinfo-3.3.1/linuxinfo_ia64.c:83:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string2, vendors[i], strlen(vendors[i])) == 0) data/linuxinfo-3.3.1/linuxinfo_ia64.c:90:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "model", strlen("model")) == 0) data/linuxinfo-3.3.1/linuxinfo_ia64.c:104:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string2, models[i], strlen(models[i])) == 0) data/linuxinfo-3.3.1/linuxinfo_ia64.c:113:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "family", strlen("family")) == 0) data/linuxinfo-3.3.1/linuxinfo_ia64.c:116:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "cpu MHz", strlen("cpu MHz")) == 0) data/linuxinfo-3.3.1/linuxinfo_ia64.c:122:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncasecmp(temp_string, "bogomips", strlen("bogomips")) == 0) data/linuxinfo-3.3.1/linuxinfo_ia64.c:135:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_ia64.c:140:3: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_megahertz, "?"); data/linuxinfo-3.3.1/linuxinfo_intel.c:247:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "processor", strlen("processor")) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:250:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "vendor_id", strlen("vendor_id")) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:256:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string2, vendors[i], strlen(vendors[i])) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:263:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "model name", strlen("model name")) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:265:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "model", strlen("model")) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:276:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string2, models[i], strlen(models[i])) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:286:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "cpu family", strlen("cpu family")) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:289:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "cpu MHz", strlen("cpu MHz")) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:295:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "bogomips", strlen("bogomips")) == 0) data/linuxinfo-3.3.1/linuxinfo_intel.c:316:3: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_intel.c:321:3: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_megahertz, "?"); data/linuxinfo-3.3.1/linuxinfo_m68k.c:68:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_mips.c:47:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu model", strlen("cpu model")))) data/linuxinfo-3.3.1/linuxinfo_mips.c:62:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "BogoMIPS", strlen("BogoMIPS")))) data/linuxinfo-3.3.1/linuxinfo_mips.c:81:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(endian, "Unknown", strlen("Unknown"))) data/linuxinfo-3.3.1/linuxinfo_mips.c:91:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_mips.c:95:2: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_megahertz, "?"); data/linuxinfo-3.3.1/linuxinfo_ppc.c:46:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu", strlen("cpu")))) data/linuxinfo-3.3.1/linuxinfo_ppc.c:52:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "model", strlen("model")))) data/linuxinfo-3.3.1/linuxinfo_ppc.c:55:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "machine", strlen("machine")))) data/linuxinfo-3.3.1/linuxinfo_ppc.c:58:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "clock", strlen("clock")))) data/linuxinfo-3.3.1/linuxinfo_ppc.c:66:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "bogomips", strlen("bogomips")))) data/linuxinfo-3.3.1/linuxinfo_ppc.c:78:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(hw->hw_megahertz, "?"); data/linuxinfo-3.3.1/linuxinfo_ppc.c:82:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_s390.c:58:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "vendor_id", strlen("vendor_id")))) data/linuxinfo-3.3.1/linuxinfo_s390.c:61:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "# processors", strlen("# processors")))) data/linuxinfo-3.3.1/linuxinfo_s390.c:64:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "bogomips per cpu", strlen("bogomips per cp")))) data/linuxinfo-3.3.1/linuxinfo_s390.c:76:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_sh.c:43:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "processor", strlen("processor")) == 0) data/linuxinfo-3.3.1/linuxinfo_sh.c:47:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu type", strlen("cpu type")))) data/linuxinfo-3.3.1/linuxinfo_sh.c:51:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "cpu family", strlen("cpu family")))) data/linuxinfo-3.3.1/linuxinfo_sh.c:55:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "bogomips", strlen("bogomips")))) { data/linuxinfo-3.3.1/linuxinfo_sh.c:66:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_sparc.c:78:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string, "cpu", strlen("cpu")) == 0) data/linuxinfo-3.3.1/linuxinfo_sparc.c:84:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string2, vendors[i], strlen(vendors[i])) == 0) data/linuxinfo-3.3.1/linuxinfo_sparc.c:93:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(temp_string2, models[i], strlen(models[i])) == 0) data/linuxinfo-3.3.1/linuxinfo_sparc.c:100:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "ncpus", strlen("ncpus"))) && (processors == 0)) data/linuxinfo-3.3.1/linuxinfo_sparc.c:103:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "BogoMips", strlen("BogoMips")))) data/linuxinfo-3.3.1/linuxinfo_sparc.c:106:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(strncmp(temp_string, "Cpu0Bogo", strlen("Cpu0Bogo")))) data/linuxinfo-3.3.1/linuxinfo_sparc.c:113:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(hw->hw_megahertz, "?"); data/linuxinfo-3.3.1/linuxinfo_sparc.c:116:6: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_bogomips, "?"); data/linuxinfo-3.3.1/linuxinfo_unknown.c:32:2: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf(hw->hw_megahertz, "?"); ANALYSIS SUMMARY: Hits = 259 Lines analyzed = 2036 in approximately 0.16 seconds (12818 lines/second) Physical Source Lines of Code (SLOC) = 1257 Hits@level = [0] 28 [1] 87 [2] 104 [3] 0 [4] 68 [5] 0 Hits@level+ = [0+] 287 [1+] 259 [2+] 172 [3+] 68 [4+] 68 [5+] 0 Hits/KSLOC@level+ = [0+] 228.321 [1+] 206.046 [2+] 136.834 [3+] 54.0971 [4+] 54.0971 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.