Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/memtest86-4.3.7/screen_buffer.h
Examining data/memtest86-4.3.7/msr.h
Examining data/memtest86-4.3.7/main.c
Examining data/memtest86-4.3.7/vmem.c
Examining data/memtest86-4.3.7/stdint.h
Examining data/memtest86-4.3.7/screen_buffer.c
Examining data/memtest86-4.3.7/error.c
Examining data/memtest86-4.3.7/memsize.c
Examining data/memtest86-4.3.7/smp.h
Examining data/memtest86-4.3.7/config.h
Examining data/memtest86-4.3.7/random.c
Examining data/memtest86-4.3.7/cpuid.h
Examining data/memtest86-4.3.7/config.c
Examining data/memtest86-4.3.7/init.c
Examining data/memtest86-4.3.7/patn.c
Examining data/memtest86-4.3.7/lib.c
Examining data/memtest86-4.3.7/cpuid.c
Examining data/memtest86-4.3.7/smp.c
Examining data/memtest86-4.3.7/io.h
Examining data/memtest86-4.3.7/test.c
Examining data/memtest86-4.3.7/test.h
Examining data/memtest86-4.3.7/elf.h
Examining data/memtest86-4.3.7/defs.h
Examining data/memtest86-4.3.7/reloc.c
Examining data/memtest86-4.3.7/serial.h

FINAL RESULTS:

data/memtest86-4.3.7/config.c:29:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char save[2][POP_H][POP_W];
data/memtest86-4.3.7/config.c:30:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char save2[2][POP2_H][POP2_W];
data/memtest86-4.3.7/config.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cp[64];
data/memtest86-4.3.7/cpuid.h:48:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char ch[48];
data/memtest86-4.3.7/cpuid.h:66:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           char_array[CPUID_VENDOR_STR_LENGTH];
data/memtest86-4.3.7/cpuid.h:73:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char           char_array[CPUID_BRAND_STR_LENGTH];
data/memtest86-4.3.7/elf.h:173:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	e_ident[EI_NIDENT];	/* File identification. */
data/memtest86-4.3.7/elf.h:190:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	e_ident[EI_NIDENT];	/* File identification. */
data/memtest86-4.3.7/error.c:431:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char spin[4] = {'|','/','-','\\'};
data/memtest86-4.3.7/lib.c:260:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
void memcpy (void *dst, void *src, int len)
data/memtest86-4.3.7/lib.c:305:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[18];
data/memtest86-4.3.7/lib.c:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[18];
data/memtest86-4.3.7/lib.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[18];
data/memtest86-4.3.7/lib.c:705:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/memtest86-4.3.7/lib.c:817:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char sx[3];
data/memtest86-4.3.7/lib.c:818:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char sy[3];
data/memtest86-4.3.7/main.c:76:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char		cpu_mask[MAX_CPUS];
data/memtest86-4.3.7/screen_buffer.c:19:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char screen_buf[Y_SIZE][X_SIZE];
data/memtest86-4.3.7/smp.c:17:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
extern void memcpy(void *dst, void *src , int len);
data/memtest86-4.3.7/smp.c:236:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((uint8_t*)BOOTCODESTART, &_ap_trampoline_start, len);
data/memtest86-4.3.7/smp.c:248:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((uint8_t *)GDTADDR, &gdt, 32);
data/memtest86-4.3.7/smp.h:29:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   oem[8];
data/memtest86-4.3.7/smp.h:30:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   productid[12];
data/memtest86-4.3.7/smp.h:64:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  bustype[6];
data/memtest86-4.3.7/smp.h:112:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char signature[8];   // "RSD "
data/memtest86-4.3.7/smp.h:114:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char oemid[6];
data/memtest86-4.3.7/smp.h:125:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char signature[4];   // "RSDT"
data/memtest86-4.3.7/smp.h:129:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char oemid[18];
data/memtest86-4.3.7/smp.h:130:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cid[4];
data/memtest86-4.3.7/smp.h:131:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cver[4];
data/memtest86-4.3.7/init.c:352:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				char* afterFound = found + strlen(removeStrings[i]);
data/memtest86-4.3.7/lib.c:68:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t strlen ( const char * str )
data/memtest86-4.3.7/lib.c:81:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t str2len = strlen(str2);
data/memtest86-4.3.7/test.h:102:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
size_t strlen ( const char * str );

ANALYSIS SUMMARY:

Hits = 34
Lines analyzed = 10439 in approximately 0.25 seconds (41508 lines/second)
Physical Source Lines of Code (SLOC) = 7967
Hits@level = [0]   0 [1]   4 [2]  30 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]  34 [1+]  34 [2+]  30 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 4.2676 [1+] 4.2676 [2+] 3.76553 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.