Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/minicoredumper-2.0.1/src/api/minicoredumper.h
Examining data/minicoredumper-2.0.1/src/common/common.h
Examining data/minicoredumper-2.0.1/src/common/elf_dumplist.c
Examining data/minicoredumper-2.0.1/src/common/invalid_ident.c
Examining data/minicoredumper-2.0.1/src/coreinject/main.c
Examining data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c
Examining data/minicoredumper-2.0.1/src/minicoredumper/corestripper.h
Examining data/minicoredumper-2.0.1/src/minicoredumper/prog_config.c
Examining data/minicoredumper-2.0.1/src/minicoredumper/prog_config.h
Examining data/minicoredumper-2.0.1/src/minicoredumper_regd/daemon.c
Examining data/minicoredumper-2.0.1/src/libminicoredumper/mcd.c
Examining data/minicoredumper-2.0.1/src/libminicoredumper/dump_data_private.h
Examining data/minicoredumper-2.0.1/src/minicoredumper_demo/main.c

FINAL RESULTS:

data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:524:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	ret = readlink(tmp_path, exe, PATH_MAX + 1);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2808:8:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	ret = readlink(src, linkname, sb.st_size + 1);
data/minicoredumper-2.0.1/src/api/minicoredumper.h:51:51:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define ATTR_FMT(si, ftc) __attribute__ ((format (scanf, si, ftc)))
data/minicoredumper-2.0.1/src/common/elf_dumplist.c:312:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(NOTE_NAME_PTR(n), NT_OWNER);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:74:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(global_di->info_file, fmt, ap);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:95:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(global_di->info_file, msg, ap);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1186:2:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execlp(cmd, cmd, NULL);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1252:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(hdr.sparse_map[i].offset,
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1255:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(hdr.sparse_map[i].numbytes,
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1266:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(hdr.numbytes, sizeof(hdr.numbytes), "%011" PRIo64,
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1271:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(hdr.filesize, sizeof(hdr.filesize),
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1300:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(s.offset, sizeof(s.offset), "%011" PRIo64,
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1302:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(s.numbytes, sizeof(s.numbytes),
data/minicoredumper-2.0.1/src/coreinject/main.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[128];
data/minicoredumper-2.0.1/src/coreinject/main.c:264:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f_dump = fopen(direct.filename, "r");
data/minicoredumper-2.0.1/src/coreinject/main.c:281:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f_dump = fopen(indirect.filename, "r");
data/minicoredumper-2.0.1/src/coreinject/main.c:430:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_core = fopen(core_filename, "r+");
data/minicoredumper-2.0.1/src/coreinject/main.c:444:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_symmap = fopen(argv[i], "r");
data/minicoredumper-2.0.1/src/coreinject/main.c:479:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(core_filename, O_RDWR);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:342:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_src = fopen(src, "r");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:346:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f_dest = fopen(dest, "w");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:480:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(tmp_path, "r");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:541:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timestamp_str[sizeof("YYYYMMDD.HHMMSS+0000")];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:685:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		di->core_fd = open(di->core_path, O_CREAT|O_RDWR, S_IRUSR|S_IWUSR);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:705:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		di->fatcore_fd = open(tmp_path, O_CREAT|O_RDWR,
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:720:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	di->mem_fd = open(tmp_path, O_RDONLY);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:743:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	di->info_file = fopen(tmp_path, "w+");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:995:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char offset[12];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:996:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char numbytes[12];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1000:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[100];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1001:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mode[8];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1002:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uid[8];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1003:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gid[8];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1004:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char numbytes[12];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1005:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mtime[12];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1006:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char checksum[8];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1008:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linkname[100];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1009:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[6];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1010:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[2];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1011:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[32];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1012:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char groupname[32];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1013:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_major[8];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1014:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dev_minor[8];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1015:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char atime[12];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1016:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctime[12];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1017:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char multivolume_offset[12];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1018:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char longnames[4];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1022:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filesize[12];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1023:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pad1[17];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1149:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(tmp_path, O_CREAT|O_RDWR, S_IRUSR|S_IWUSR);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1238:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hdr.magic, "ustar ", 6);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1745:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	sd->fd = open(file, O_RDONLY);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:1915:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(buf, "r");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2207:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(buf, "r");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2520:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(tmp_path, "a");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2639:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(tmp_path, "wx");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2641:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file = fopen(tmp_path, "a");
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:3253:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(filename, O_RDONLY);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:3502:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:3517:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ptrace(request, atoi(de->d_name), NULL, NULL);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:3608:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ext_argv[10] = {
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:3681:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pidstr[16];
data/minicoredumper-2.0.1/src/minicoredumper_demo/main.c:90:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		i = atoi(argv[1]);
data/minicoredumper-2.0.1/src/minicoredumper_regd/daemon.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char control[CMSG_SPACE(sizeof(struct ucred))];
data/minicoredumper-2.0.1/src/minicoredumper_regd/daemon.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rd, &data, sizeof(*rd));
data/minicoredumper-2.0.1/src/common/elf_dumplist.c:38:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	data->d_size = strlen(name_str) + 1;
data/minicoredumper-2.0.1/src/common/elf_dumplist.c:299:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	name_size = strlen(NT_OWNER) + 1;
data/minicoredumper-2.0.1/src/coreinject/main.c:322:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(arg, "--data=", strlen("--data=")) != 0) {
data/minicoredumper-2.0.1/src/coreinject/main.c:333:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p1 = arg + strlen("--data=");
data/minicoredumper-2.0.1/src/libminicoredumper/mcd.c:194:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return (strlen((char *)data) + 1);
data/minicoredumper-2.0.1/src/libminicoredumper/mcd.c:240:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	maxcnt = strlen(fmt);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:110:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		r = read(fd, dst + size, len);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:165:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(fmt);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:272:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwrite(d_str, 1, strlen(d_str), ft);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:297:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(fmt_string);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:353:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		i = fgetc(f_src);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2514:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(di->dst_dir) + strlen("/symbol.map") + 1;
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2514:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(di->dst_dir) + strlen("/symbol.map") + 1;
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2621:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(di->dst_dir) + strlen("/dumps/") + 32 +
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2621:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(di->dst_dir) + strlen("/dumps/") + 32 +
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2622:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      strlen(dd->ident) + 1;
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2838:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base_len = strlen(di->dst_dir);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2841:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = base_len + strlen("/proc/") + 32 + strlen("/task/") + 32 +
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2841:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = base_len + strlen("/proc/") + 32 + strlen("/task/") + 32 +
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2842:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       + strlen("/fd/") + strlen(name) + 32;
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:2842:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       + strlen("/fd/") + strlen(name) + 32;
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:3264:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(fd, buf, PAGESZ);
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:3306:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				dump_vma(di, addr, strlen(l_name) + 1, 0,
data/minicoredumper-2.0.1/src/minicoredumper/corestripper.c:3747:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(077);

ANALYSIS SUMMARY:

Hits = 90
Lines analyzed = 7016 in approximately 0.16 seconds (44031 lines/second)
Physical Source Lines of Code (SLOC) = 5088
Hits@level = [0]  90 [1]  24 [2]  53 [3]   0 [4]  11 [5]   2
Hits@level+ = [0+] 180 [1+]  90 [2+]  66 [3+]  13 [4+]  13 [5+]   2
Hits/KSLOC@level+ = [0+] 35.3774 [1+] 17.6887 [2+] 12.9717 [3+] 2.55503 [4+] 2.55503 [5+] 0.393082
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.