Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/network-manager-1.27.91/libnm/nm-device-generic.c
Examining data/network-manager-1.27.91/libnm/nm-device-ip-tunnel.c
Examining data/network-manager-1.27.91/libnm/nm-device-infiniband.c
Examining data/network-manager-1.27.91/libnm/nm-device-wifi-p2p.c
Examining data/network-manager-1.27.91/libnm/nm-device-infiniband.h
Examining data/network-manager-1.27.91/libnm/nm-device-wpan.c
Examining data/network-manager-1.27.91/libnm/nm-device-6lowpan.c
Examining data/network-manager-1.27.91/libnm/nm-device-ovs-port.h
Examining data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c
Examining data/network-manager-1.27.91/libnm/nm-device-bt.c
Examining data/network-manager-1.27.91/libnm/nm-ip4-config.h
Examining data/network-manager-1.27.91/libnm/nm-secret-agent-old.c
Examining data/network-manager-1.27.91/libnm/nm-wifi-p2p-peer.c
Examining data/network-manager-1.27.91/libnm/nm-device-team.h
Examining data/network-manager-1.27.91/libnm/nm-ip4-config.c
Examining data/network-manager-1.27.91/libnm/nm-device.h
Examining data/network-manager-1.27.91/libnm/nm-device-vrf.c
Examining data/network-manager-1.27.91/libnm/nm-dbus-helpers.c
Examining data/network-manager-1.27.91/libnm/nm-vpn-connection.c
Examining data/network-manager-1.27.91/libnm/nm-device-vrf.h
Examining data/network-manager-1.27.91/libnm/nm-device-ethernet.c
Examining data/network-manager-1.27.91/libnm/nm-device-ovs-bridge.h
Examining data/network-manager-1.27.91/libnm/nm-dhcp6-config.c
Examining data/network-manager-1.27.91/libnm/nm-device-wireguard.c
Examining data/network-manager-1.27.91/libnm/nm-object.h
Examining data/network-manager-1.27.91/libnm/nm-device-olpc-mesh.h
Examining data/network-manager-1.27.91/libnm/nm-device-vlan.c
Examining data/network-manager-1.27.91/libnm/nm-device-wimax.c
Examining data/network-manager-1.27.91/libnm/nm-device-ovs-interface.c
Examining data/network-manager-1.27.91/libnm/nm-device-ppp.c
Examining data/network-manager-1.27.91/libnm/nm-device-ethernet.h
Examining data/network-manager-1.27.91/libnm/nm-object-private.h
Examining data/network-manager-1.27.91/libnm/nm-device-adsl.c
Examining data/network-manager-1.27.91/libnm/nm-device-tun.h
Examining data/network-manager-1.27.91/libnm/NetworkManager.h
Examining data/network-manager-1.27.91/libnm/nm-dns-manager.h
Examining data/network-manager-1.27.91/libnm/nm-libnm-utils.c
Examining data/network-manager-1.27.91/libnm/nm-secret-agent-old.h
Examining data/network-manager-1.27.91/libnm/nm-device-vxlan.h
Examining data/network-manager-1.27.91/libnm/nm-access-point.h
Examining data/network-manager-1.27.91/libnm/nm-libnm-aux/nm-libnm-aux.h
Examining data/network-manager-1.27.91/libnm/nm-libnm-aux/nm-libnm-aux.c
Examining data/network-manager-1.27.91/libnm/nm-dhcp6-config.h
Examining data/network-manager-1.27.91/libnm/nm-ip-config.h
Examining data/network-manager-1.27.91/libnm/nm-device-wireguard.h
Examining data/network-manager-1.27.91/libnm/nm-vpn-plugin-old.c
Examining data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.h
Examining data/network-manager-1.27.91/libnm/nm-device-ovs-port.c
Examining data/network-manager-1.27.91/libnm/nm-device-dummy.c
Examining data/network-manager-1.27.91/libnm/nm-client.c
Examining data/network-manager-1.27.91/libnm/nm-device-macsec.h
Examining data/network-manager-1.27.91/libnm/nm-device-olpc-mesh.c
Examining data/network-manager-1.27.91/libnm/nm-wimax-nsp.h
Examining data/network-manager-1.27.91/libnm/nm-device-generic.h
Examining data/network-manager-1.27.91/libnm/nm-device-private.h
Examining data/network-manager-1.27.91/libnm/nm-vpn-editor.h
Examining data/network-manager-1.27.91/libnm/nm-device-ppp.h
Examining data/network-manager-1.27.91/libnm/nm-device-dummy.h
Examining data/network-manager-1.27.91/libnm/nm-dns-manager.c
Examining data/network-manager-1.27.91/libnm/nm-device-team.c
Examining data/network-manager-1.27.91/libnm/nm-ip6-config.c
Examining data/network-manager-1.27.91/libnm/nm-device-wimax.h
Examining data/network-manager-1.27.91/libnm/nm-device-macsec.c
Examining data/network-manager-1.27.91/libnm/nm-object.c
Examining data/network-manager-1.27.91/libnm/nm-checkpoint.c
Examining data/network-manager-1.27.91/libnm/nm-vpn-plugin-old.h
Examining data/network-manager-1.27.91/libnm/nm-dhcp-config.h
Examining data/network-manager-1.27.91/libnm/nm-active-connection.c
Examining data/network-manager-1.27.91/libnm/nm-device-wifi.h
Examining data/network-manager-1.27.91/libnm/nm-types.h
Examining data/network-manager-1.27.91/libnm/nm-dbus-helpers.h
Examining data/network-manager-1.27.91/libnm/nm-device-modem.h
Examining data/network-manager-1.27.91/libnm/nm-dhcp4-config.h
Examining data/network-manager-1.27.91/libnm/nm-device-modem.c
Examining data/network-manager-1.27.91/libnm/nm-device-ip-tunnel.h
Examining data/network-manager-1.27.91/libnm/nm-device-wifi.c
Examining data/network-manager-1.27.91/libnm/nm-wimax-nsp.c
Examining data/network-manager-1.27.91/libnm/nm-device-bridge.h
Examining data/network-manager-1.27.91/libnm/nm-checkpoint.h
Examining data/network-manager-1.27.91/libnm/nm-device-vxlan.c
Examining data/network-manager-1.27.91/libnm/nm-device-macvlan.c
Examining data/network-manager-1.27.91/libnm/nm-device-bond.h
Examining data/network-manager-1.27.91/libnm/nm-device-macvlan.h
Examining data/network-manager-1.27.91/libnm/nm-device-bt.h
Examining data/network-manager-1.27.91/libnm/nm-device-wifi-p2p.h
Examining data/network-manager-1.27.91/libnm/nm-device-tun.c
Examining data/network-manager-1.27.91/libnm/nm-client.h
Examining data/network-manager-1.27.91/libnm/nm-device-6lowpan.h
Examining data/network-manager-1.27.91/libnm/nm-device-ovs-interface.h
Examining data/network-manager-1.27.91/libnm/nm-dhcp4-config.c
Examining data/network-manager-1.27.91/libnm/nm-device-adsl.h
Examining data/network-manager-1.27.91/libnm/nm-dhcp-config.c
Examining data/network-manager-1.27.91/libnm/nm-remote-connection.h
Examining data/network-manager-1.27.91/libnm/nm-device-ovs-bridge.c
Examining data/network-manager-1.27.91/libnm/nm-device-bond.c
Examining data/network-manager-1.27.91/libnm/nm-active-connection.h
Examining data/network-manager-1.27.91/libnm/nm-remote-connection-private.h
Examining data/network-manager-1.27.91/libnm/nm-vpn-editor.c
Examining data/network-manager-1.27.91/libnm/tests/test-libnm.c
Examining data/network-manager-1.27.91/libnm/tests/test-remote-settings-client.c
Examining data/network-manager-1.27.91/libnm/tests/test-secret-agent.c
Examining data/network-manager-1.27.91/libnm/tests/test-nm-client.c
Examining data/network-manager-1.27.91/libnm/nm-ip6-config.h
Examining data/network-manager-1.27.91/libnm/nm-device-wpan.h
Examining data/network-manager-1.27.91/libnm/nm-device.c
Examining data/network-manager-1.27.91/libnm/nm-vpn-connection.h
Examining data/network-manager-1.27.91/libnm/nm-autoptr.h
Examining data/network-manager-1.27.91/libnm/nm-device-bridge.c
Examining data/network-manager-1.27.91/libnm/nm-device-vlan.h
Examining data/network-manager-1.27.91/libnm/nm-wifi-p2p-peer.h
Examining data/network-manager-1.27.91/libnm/nm-remote-connection.c
Examining data/network-manager-1.27.91/libnm/nm-ip-config.c
Examining data/network-manager-1.27.91/libnm/nm-access-point.c
Examining data/network-manager-1.27.91/libnm/nm-libnm-utils.h
Examining data/network-manager-1.27.91/examples/C/glib/monitor-nm-running-gdbus.c
Examining data/network-manager-1.27.91/examples/C/glib/list-connections-gdbus.c
Examining data/network-manager-1.27.91/examples/C/glib/get-active-connections-gdbus.c
Examining data/network-manager-1.27.91/examples/C/glib/add-connection-gdbus.c
Examining data/network-manager-1.27.91/examples/C/glib/get-ap-info-libnm.c
Examining data/network-manager-1.27.91/examples/C/glib/monitor-nm-state-gdbus.c
Examining data/network-manager-1.27.91/examples/C/glib/add-connection-libnm.c
Examining data/network-manager-1.27.91/examples/C/glib/list-connections-libnm.c
Examining data/network-manager-1.27.91/examples/C/qt/change-ipv4-addresses.cpp
Examining data/network-manager-1.27.91/examples/C/qt/monitor-nm-running.cpp
Examining data/network-manager-1.27.91/examples/C/qt/list-connections.cpp
Examining data/network-manager-1.27.91/examples/C/qt/add-connection-wired.cpp
Examining data/network-manager-1.27.91/libnm-core/nm-setting-cdma.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireless-security.h
Examining data/network-manager-1.27.91/libnm-core/nm-utils.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireless.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-bond.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wired.c
Examining data/network-manager-1.27.91/libnm-core/nm-connection-private.h
Examining data/network-manager-1.27.91/libnm-core/nm-crypto.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-dcb.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-match.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-proxy.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip-tunnel.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-vxlan.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireless-security.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-adsl.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wifi-p2p.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-team-port.h
Examining data/network-manager-1.27.91/libnm-core/nm-vpn-plugin-info.h
Examining data/network-manager-1.27.91/libnm-core/nm-property-compare.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-user.h
Examining data/network-manager-1.27.91/libnm-core/nm-dbus-utils.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-dcb.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-user.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-pppoe.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-dummy.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wired.h
Examining data/network-manager-1.27.91/libnm-core/nm-property-compare.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-bluetooth.c
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-ethtool-utils.h
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-ethtool-utils.c
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-auth-subject.h
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-common-macros.h
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.h
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-auth-subject.c
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.c
Examining data/network-manager-1.27.91/libnm-core/nm-vpn-plugin-info.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-bridge.c
Examining data/network-manager-1.27.91/libnm-core/nm-team-utils.h
Examining data/network-manager-1.27.91/libnm-core/nm-vpn-editor-plugin.h
Examining data/network-manager-1.27.91/libnm-core/nm-connection.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wifi-p2p.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-infiniband.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-vlan.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-macvlan.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-cdma.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wpan.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-generic.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-olpc-mesh.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-serial.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-patch.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ethtool.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-port.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip6-config.c
Examining data/network-manager-1.27.91/libnm-core/nm-dbus-interface.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-bridge-port.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-macsec.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-match.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-bond.c
Examining data/network-manager-1.27.91/libnm-core/nm-errors.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-bridge-port.h
Examining data/network-manager-1.27.91/libnm-core/nm-vpn-dbus-interface.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-gsm.h
Examining data/network-manager-1.27.91/libnm-core/nm-utils-private.h
Examining data/network-manager-1.27.91/libnm-core/nm-version.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-gsm.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-interface.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ethtool.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-bridge.h
Examining data/network-manager-1.27.91/libnm-core/nm-simple-connection.c
Examining data/network-manager-1.27.91/libnm-core/nm-crypto-nss.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c
Examining data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c
Examining data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c
Examining data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-internal.h
Examining data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip-tunnel.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-proxy.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-8021x.h
Examining data/network-manager-1.27.91/libnm-core/nm-core-internal.h
Examining data/network-manager-1.27.91/libnm-core/nm-crypto-gnutls.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-olpc-mesh.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-bridge.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-dummy.c
Examining data/network-manager-1.27.91/libnm-core/nm-utils.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-port.h
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-libnm-core-aux.c
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-dispatcher-api.h
Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-libnm-core-aux.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-patch.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-vrf.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-dpdk.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip6-config.h
Examining data/network-manager-1.27.91/libnm-core/nm-connection.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wimax.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-pppoe.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wpan.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-vpn.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting.h
Examining data/network-manager-1.27.91/libnm-core/nm-crypto-impl.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-sriov.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-bluetooth.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-vpn.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-tc-config.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-private.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-adsl.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-sriov.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-team-port.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wimax.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-connection.h
Examining data/network-manager-1.27.91/libnm-core/nm-core-types.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-vxlan.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-vlan.c
Examining data/network-manager-1.27.91/libnm-core/nm-crypto.h
Examining data/network-manager-1.27.91/libnm-core/nm-simple-connection.h
Examining data/network-manager-1.27.91/libnm-core/nm-team-utils.c
Examining data/network-manager-1.27.91/libnm-core/nm-vpn-editor-plugin.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-tun.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-serial.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ppp.h
Examining data/network-manager-1.27.91/libnm-core/nm-errors.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-vrf.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-tc-config.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-team.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-connection.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-interface.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-infiniband.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-6lowpan.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireless.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-macsec.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip4-config.c
Examining data/network-manager-1.27.91/libnm-core/tests/test-compare.c
Examining data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c
Examining data/network-manager-1.27.91/libnm-core/tests/test-general.c
Examining data/network-manager-1.27.91/libnm-core/tests/test-settings-defaults.c
Examining data/network-manager-1.27.91/libnm-core/tests/test-setting.c
Examining data/network-manager-1.27.91/libnm-core/tests/test-secrets.c
Examining data/network-manager-1.27.91/libnm-core/tests/test-general-enums.h
Examining data/network-manager-1.27.91/libnm-core/tests/test-crypto.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-macvlan.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-bridge.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-team.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip4-config.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-dpdk.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-tun.c
Examining data/network-manager-1.27.91/libnm-core/nm-core-types-internal.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ppp.c
Examining data/network-manager-1.27.91/libnm-core/nm-setting-generic.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-6lowpan.h
Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c
Examining data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c
Examining data/network-manager-1.27.91/clients/common/settings-docs.h
Examining data/network-manager-1.27.91/clients/common/qrcodegen.c
Examining data/network-manager-1.27.91/clients/common/nm-client-utils.c
Examining data/network-manager-1.27.91/clients/common/nm-vpn-helpers.h
Examining data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c
Examining data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c
Examining data/network-manager-1.27.91/clients/common/qrcodegen.h
Examining data/network-manager-1.27.91/clients/common/nm-polkit-listener.h
Examining data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c
Examining data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.h
Examining data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.h
Examining data/network-manager-1.27.91/clients/common/nm-polkit-listener.c
Examining data/network-manager-1.27.91/clients/common/tests/test-libnm-core-aux.c
Examining data/network-manager-1.27.91/clients/common/tests/test-clients-common.c
Examining data/network-manager-1.27.91/clients/common/nm-client-utils.h
Examining data/network-manager-1.27.91/clients/common/nm-meta-setting-access.h
Examining data/network-manager-1.27.91/clients/cloud-setup/nm-http-client.c
Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.h
Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.h
Examining data/network-manager-1.27.91/clients/cloud-setup/nm-http-client.h
Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c
Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider.h
Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.c
Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.h
Examining data/network-manager-1.27.91/clients/cloud-setup/nm-cloud-setup-utils.c
Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c
Examining data/network-manager-1.27.91/clients/cloud-setup/main.c
Examining data/network-manager-1.27.91/clients/cloud-setup/nm-cloud-setup-utils.h
Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider.c
Examining data/network-manager-1.27.91/clients/cli/connections.c
Examining data/network-manager-1.27.91/clients/cli/generate-docs-nm-settings-nmcli.c
Examining data/network-manager-1.27.91/clients/cli/utils.h
Examining data/network-manager-1.27.91/clients/cli/settings.h
Examining data/network-manager-1.27.91/clients/cli/common.h
Examining data/network-manager-1.27.91/clients/cli/connections.h
Examining data/network-manager-1.27.91/clients/cli/agent.c
Examining data/network-manager-1.27.91/clients/cli/nmcli.h
Examining data/network-manager-1.27.91/clients/cli/nmcli.c
Examining data/network-manager-1.27.91/clients/cli/utils.c
Examining data/network-manager-1.27.91/clients/cli/polkit-agent.c
Examining data/network-manager-1.27.91/clients/cli/common.c
Examining data/network-manager-1.27.91/clients/cli/devices.h
Examining data/network-manager-1.27.91/clients/cli/settings.c
Examining data/network-manager-1.27.91/clients/cli/devices.c
Examining data/network-manager-1.27.91/clients/cli/polkit-agent.h
Examining data/network-manager-1.27.91/clients/cli/general.c
Examining data/network-manager-1.27.91/clients/nm-online.c
Examining data/network-manager-1.27.91/clients/tui/nmt-edit-connection-list.h
Examining data/network-manager-1.27.91/clients/tui/nmtui-edit.c
Examining data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-bridge.h
Examining data/network-manager-1.27.91/clients/tui/nmt-mac-entry.c
Examining data/network-manager-1.27.91/clients/tui/nmtui-connect.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-vlan.h
Examining data/network-manager-1.27.91/clients/tui/nmt-route-table.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-dsl.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-bond.h
Examining data/network-manager-1.27.91/clients/tui/nmtui-hostname.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip-tunnel.c
Examining data/network-manager-1.27.91/clients/tui/nmt-device-entry.h
Examining data/network-manager-1.27.91/clients/tui/nmtui-hostname.c
Examining data/network-manager-1.27.91/clients/tui/nmt-route-entry.c
Examining data/network-manager-1.27.91/clients/tui/nm-editor-utils.c
Examining data/network-manager-1.27.91/clients/tui/nmt-editor-page.c
Examining data/network-manager-1.27.91/clients/tui/nmt-slave-list.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-team.h
Examining data/network-manager-1.27.91/clients/tui/nmt-password-dialog.c
Examining data/network-manager-1.27.91/clients/tui/nmt-editor-section.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip6.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ethernet.c
Examining data/network-manager-1.27.91/clients/tui/nmt-slave-list.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-vlan.c
Examining data/network-manager-1.27.91/clients/tui/nmt-editor-section.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-infiniband.c
Examining data/network-manager-1.27.91/clients/tui/nmt-editor-page-device.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ppp.c
Examining data/network-manager-1.27.91/clients/tui/nm-editor-utils.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ppp.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-bond.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-wifi.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip4.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-dsl.h
Examining data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-button.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-popup.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-checkbox.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-separator.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-separator.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-stack.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-utils.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-textbox.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-toggle-button.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-listbox.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-form.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-hacks.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-widget.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-widget.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-button-box.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-popup.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-grid.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-toggle-button.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-component.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-label.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-container.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-checkbox.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-listbox.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-hacks.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-textbox.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-component.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-stack.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-utils.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-button.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-container.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-button-box.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry-numeric.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-label.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry-numeric.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-form.c
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-types.h
Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-grid.h
Examining data/network-manager-1.27.91/clients/tui/nmt-widget-list.h
Examining data/network-manager-1.27.91/clients/tui/nmt-address-list.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-team-port.h
Examining data/network-manager-1.27.91/clients/tui/nmt-mtu-entry.c
Examining data/network-manager-1.27.91/clients/tui/nmt-route-entry.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-infiniband.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-bridge-port.c
Examining data/network-manager-1.27.91/clients/tui/nmtui.c
Examining data/network-manager-1.27.91/clients/tui/nmt-editor-page-device.c
Examining data/network-manager-1.27.91/clients/tui/nmt-editor-grid.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-team.c
Examining data/network-manager-1.27.91/clients/tui/nmt-utils.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip6.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-wifi.c
Examining data/network-manager-1.27.91/clients/tui/nmt-address-list.c
Examining data/network-manager-1.27.91/clients/tui/nmt-utils.c
Examining data/network-manager-1.27.91/clients/tui/nmt-device-entry.c
Examining data/network-manager-1.27.91/clients/tui/nmt-password-dialog.h
Examining data/network-manager-1.27.91/clients/tui/nmtui-edit.h
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip4.h
Examining data/network-manager-1.27.91/clients/tui/nmtui.h
Examining data/network-manager-1.27.91/clients/tui/nmt-password-fields.c
Examining data/network-manager-1.27.91/clients/tui/nmt-editor.h
Examining data/network-manager-1.27.91/clients/tui/nmt-editor.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-bridge.c
Examining data/network-manager-1.27.91/clients/tui/nmt-mac-entry.h
Examining data/network-manager-1.27.91/clients/tui/nmt-editor-grid.c
Examining data/network-manager-1.27.91/clients/tui/nmt-editor-page.h
Examining data/network-manager-1.27.91/clients/tui/nmt-route-editor.h
Examining data/network-manager-1.27.91/clients/tui/nm-editor-bindings.c
Examining data/network-manager-1.27.91/clients/tui/nmt-widget-list.c
Examining data/network-manager-1.27.91/clients/tui/nmtui-connect.c
Examining data/network-manager-1.27.91/clients/tui/nmt-ip-entry.c
Examining data/network-manager-1.27.91/clients/tui/nmt-password-fields.h
Examining data/network-manager-1.27.91/clients/tui/nmt-edit-connection-list.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ethernet.h
Examining data/network-manager-1.27.91/clients/tui/nmt-ip-entry.h
Examining data/network-manager-1.27.91/clients/tui/nmt-route-editor.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-bridge-port.h
Examining data/network-manager-1.27.91/clients/tui/nmt-route-table.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-team-port.c
Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip-tunnel.h
Examining data/network-manager-1.27.91/clients/tui/nm-editor-bindings.h
Examining data/network-manager-1.27.91/clients/tui/nmt-mtu-entry.h
Examining data/network-manager-1.27.91/src/dns/nm-dns-systemd-resolved.h
Examining data/network-manager-1.27.91/src/dns/nm-dns-unbound.c
Examining data/network-manager-1.27.91/src/dns/nm-dns-plugin.c
Examining data/network-manager-1.27.91/src/dns/nm-dns-unbound.h
Examining data/network-manager-1.27.91/src/dns/nm-dns-manager.c
Examining data/network-manager-1.27.91/src/dns/nm-dns-plugin.h
Examining data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c
Examining data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.h
Examining data/network-manager-1.27.91/src/dns/nm-dns-systemd-resolved.c
Examining data/network-manager-1.27.91/src/dns/nm-dns-manager.h
Examining data/network-manager-1.27.91/src/nm-auth-manager.h
Examining data/network-manager-1.27.91/src/nm-auth-utils.h
Examining data/network-manager-1.27.91/src/nm-dispatcher.h
Examining data/network-manager-1.27.91/src/nm-config.h
Examining data/network-manager-1.27.91/src/nm-proxy-config.h
Examining data/network-manager-1.27.91/src/settings/nm-settings-storage.h
Examining data/network-manager-1.27.91/src/settings/nm-settings-storage.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-storage.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-plugin.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-plugin.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-common.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-storage.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.h
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-reader.h
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-reader.c
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.h
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-writer.c
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-storage.c
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.c
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.h
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-writer.h
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c
Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-storage.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-plugin.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-plugin.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c
Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.h
Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/tests/test-ifupdown.c
Examining data/network-manager-1.27.91/src/settings/nm-settings-plugin.h
Examining data/network-manager-1.27.91/src/settings/nm-settings.h
Examining data/network-manager-1.27.91/src/settings/nm-settings-connection.c
Examining data/network-manager-1.27.91/src/settings/nm-settings-utils.c
Examining data/network-manager-1.27.91/src/settings/nm-secret-agent.c
Examining data/network-manager-1.27.91/src/settings/nm-settings-connection.h
Examining data/network-manager-1.27.91/src/settings/nm-secret-agent.h
Examining data/network-manager-1.27.91/src/settings/nm-agent-manager.c
Examining data/network-manager-1.27.91/src/settings/nm-agent-manager.h
Examining data/network-manager-1.27.91/src/settings/nm-settings-utils.h
Examining data/network-manager-1.27.91/src/settings/nm-settings-plugin.c
Examining data/network-manager-1.27.91/src/settings/nm-settings.c
Examining data/network-manager-1.27.91/src/nm-firewall-manager.c
Examining data/network-manager-1.27.91/src/nm-netns.h
Examining data/network-manager-1.27.91/src/nm-ip4-config.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-listener.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhcpcanon.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-client-logging.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-manager.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-manager.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-options.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-listener.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper-api.h
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhcpcd.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper.c
Examining data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-dhclient.c
Examining data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c
Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-options.c
Examining data/network-manager-1.27.91/src/nm-ip4-config.c
Examining data/network-manager-1.27.91/src/initrd/nm-initrd-generator.h
Examining data/network-manager-1.27.91/src/initrd/nm-initrd-generator.c
Examining data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c
Examining data/network-manager-1.27.91/src/initrd/nmi-dt-reader.c
Examining data/network-manager-1.27.91/src/initrd/tests/test-dt-reader.c
Examining data/network-manager-1.27.91/src/initrd/tests/test-cmdline-reader.c
Examining data/network-manager-1.27.91/src/initrd/tests/test-ibft-reader.c
Examining data/network-manager-1.27.91/src/initrd/nmi-ibft-reader.c
Examining data/network-manager-1.27.91/src/nm-hostname-manager.h
Examining data/network-manager-1.27.91/src/nm-dbus-utils.c
Examining data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c
Examining data/network-manager-1.27.91/src/vpn/nm-vpn-manager.h
Examining data/network-manager-1.27.91/src/vpn/nm-vpn-manager.c
Examining data/network-manager-1.27.91/src/vpn/nm-vpn-connection.h
Examining data/network-manager-1.27.91/src/nm-audit-manager.h
Examining data/network-manager-1.27.91/src/nm-core-utils.c
Examining data/network-manager-1.27.91/src/nm-auth-utils.c
Examining data/network-manager-1.27.91/src/nm-dbus-object.h
Examining data/network-manager-1.27.91/src/main-utils.h
Examining data/network-manager-1.27.91/src/nm-connectivity.h
Examining data/network-manager-1.27.91/src/nm-pacrunner-manager.c
Examining data/network-manager-1.27.91/src/nm-config.c
Examining data/network-manager-1.27.91/src/nm-rfkill-manager.h
Examining data/network-manager-1.27.91/src/platform/linux/nl802154.h
Examining data/network-manager-1.27.91/src/platform/nm-fake-platform.c
Examining data/network-manager-1.27.91/src/platform/nm-netlink.c
Examining data/network-manager-1.27.91/src/platform/nmp-rules-manager.h
Examining data/network-manager-1.27.91/src/platform/nm-fake-platform.h
Examining data/network-manager-1.27.91/src/platform/nm-linux-platform.h
Examining data/network-manager-1.27.91/src/platform/nm-platform.h
Examining data/network-manager-1.27.91/src/platform/nm-platform.c
Examining data/network-manager-1.27.91/src/platform/nmp-netns.h
Examining data/network-manager-1.27.91/src/platform/nmp-rules-manager.c
Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c
Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils.c
Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.h
Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils.h
Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-private.h
Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c
Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.h
Examining data/network-manager-1.27.91/src/platform/nm-netlink.h
Examining data/network-manager-1.27.91/src/platform/nmp-object.c
Examining data/network-manager-1.27.91/src/platform/nm-linux-platform.c
Examining data/network-manager-1.27.91/src/platform/nm-platform-utils.c
Examining data/network-manager-1.27.91/src/platform/nmp-netns.c
Examining data/network-manager-1.27.91/src/platform/nm-platform-utils.h
Examining data/network-manager-1.27.91/src/platform/tests/test-common.h
Examining data/network-manager-1.27.91/src/platform/tests/test-platform-general.c
Examining data/network-manager-1.27.91/src/platform/tests/test-nmp-object.c
Examining data/network-manager-1.27.91/src/platform/tests/test-address.c
Examining data/network-manager-1.27.91/src/platform/tests/test-cleanup.c
Examining data/network-manager-1.27.91/src/platform/tests/monitor.c
Examining data/network-manager-1.27.91/src/platform/tests/test-link.c
Examining data/network-manager-1.27.91/src/platform/tests/test-route.c
Examining data/network-manager-1.27.91/src/platform/tests/test-common.c
Examining data/network-manager-1.27.91/src/platform/tests/test-tc.c
Examining data/network-manager-1.27.91/src/platform/nm-platform-private.h
Examining data/network-manager-1.27.91/src/platform/nmp-object.h
Examining data/network-manager-1.27.91/src/platform/wpan/nm-wpan-utils.h
Examining data/network-manager-1.27.91/src/platform/wpan/nm-wpan-utils.c
Examining data/network-manager-1.27.91/src/nm-session-monitor.h
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.h
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-interface.h
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-interface.c
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.h
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-settings-verify.c
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-types.h
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-settings-verify.h
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c
Examining data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c
Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.c
Examining data/network-manager-1.27.91/src/nm-rfkill-manager.c
Examining data/network-manager-1.27.91/src/nm-ip-config.h
Examining data/network-manager-1.27.91/src/nm-policy.c
Examining data/network-manager-1.27.91/src/nm-pacrunner-manager.h
Examining data/network-manager-1.27.91/src/nm-proxy-config.c
Examining data/network-manager-1.27.91/src/nm-connectivity.c
Examining data/network-manager-1.27.91/src/nm-logging.c
Examining data/network-manager-1.27.91/src/nm-dbus-manager.c
Examining data/network-manager-1.27.91/src/nm-l3cfg.h
Examining data/network-manager-1.27.91/src/nm-l3-config-data.h
Examining data/network-manager-1.27.91/src/nm-ip6-config.c
Examining data/network-manager-1.27.91/src/nm-dbus-object.c
Examining data/network-manager-1.27.91/src/nm-policy.h
Examining data/network-manager-1.27.91/src/nm-act-request.h
Examining data/network-manager-1.27.91/src/nm-audit-manager.c
Examining data/network-manager-1.27.91/src/nm-dcb.h
Examining data/network-manager-1.27.91/src/nm-sleep-monitor.c
Examining data/network-manager-1.27.91/src/nm-checkpoint.c
Examining data/network-manager-1.27.91/src/nm-hostname-manager.c
Examining data/network-manager-1.27.91/src/nm-dispatcher.c
Examining data/network-manager-1.27.91/src/nm-dhcp-config.h
Examining data/network-manager-1.27.91/src/nm-active-connection.c
Examining data/network-manager-1.27.91/src/nm-test-utils-core.h
Examining data/network-manager-1.27.91/src/nm-sleep-monitor.h
Examining data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c
Examining data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-utils.c
Examining data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.h
Examining data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-utils.h
Examining data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c
Examining data/network-manager-1.27.91/src/nm-types.h
Examining data/network-manager-1.27.91/src/nm-checkpoint-manager.h
Examining data/network-manager-1.27.91/src/nm-config-data.h
Examining data/network-manager-1.27.91/src/nm-firewall-manager.h
Examining data/network-manager-1.27.91/src/ppp/nm-ppp-status.h
Examining data/network-manager-1.27.91/src/ppp/nm-ppp-manager.h
Examining data/network-manager-1.27.91/src/ppp/nm-pppd-plugin.c
Examining data/network-manager-1.27.91/src/ppp/nm-ppp-manager.c
Examining data/network-manager-1.27.91/src/ppp/nm-ppp-manager-call.c
Examining data/network-manager-1.27.91/src/ppp/nm-pppd-plugin.h
Examining data/network-manager-1.27.91/src/ppp/nm-ppp-plugin-api.h
Examining data/network-manager-1.27.91/src/ppp/nm-ppp-manager-call.h
Examining data/network-manager-1.27.91/src/nm-logging.h
Examining data/network-manager-1.27.91/src/nm-manager.h
Examining data/network-manager-1.27.91/src/nm-checkpoint.h
Examining data/network-manager-1.27.91/src/nm-keep-alive.c
Examining data/network-manager-1.27.91/src/nm-keep-alive.h
Examining data/network-manager-1.27.91/src/nm-auth-manager.c
Examining data/network-manager-1.27.91/src/nm-dhcp-config.c
Examining data/network-manager-1.27.91/src/nm-act-request.c
Examining data/network-manager-1.27.91/src/nm-l3-config-data.c
Examining data/network-manager-1.27.91/src/devices/nm-device-generic.c
Examining data/network-manager-1.27.91/src/devices/nm-device-ip-tunnel.c
Examining data/network-manager-1.27.91/src/devices/nm-device-infiniband.c
Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-port.h
Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-bridge.h
Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-interface.c
Examining data/network-manager-1.27.91/src/devices/ovs/nm-ovs-factory.c
Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-port.c
Examining data/network-manager-1.27.91/src/devices/ovs/nm-ovsdb.h
Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-interface.h
Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-bridge.c
Examining data/network-manager-1.27.91/src/devices/ovs/nm-ovsdb.c
Examining data/network-manager-1.27.91/src/devices/nm-device-infiniband.h
Examining data/network-manager-1.27.91/src/devices/nm-device-wpan.c
Examining data/network-manager-1.27.91/src/devices/wwan/nm-wwan-factory.c
Examining data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.c
Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-ofono.c
Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-manager.c
Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-ofono.h
Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-manager.h
Examining data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.h
Examining data/network-manager-1.27.91/src/devices/wwan/nm-device-modem.h
Examining data/network-manager-1.27.91/src/devices/wwan/nm-device-modem.c
Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-broadband.h
Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem.h
Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem.c
Examining data/network-manager-1.27.91/src/devices/wwan/tests/test-service-providers.c
Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-broadband.c
Examining data/network-manager-1.27.91/src/devices/nm-device-6lowpan.c
Examining data/network-manager-1.27.91/src/devices/nm-device-logging.h
Examining data/network-manager-1.27.91/src/devices/nm-device-factory.h
Examining data/network-manager-1.27.91/src/devices/nm-device.h
Examining data/network-manager-1.27.91/src/devices/nm-device-vrf.c
Examining data/network-manager-1.27.91/src/devices/nm-device-vrf.h
Examining data/network-manager-1.27.91/src/devices/nm-device-ethernet.c
Examining data/network-manager-1.27.91/src/devices/nm-device-wireguard.c
Examining data/network-manager-1.27.91/src/devices/nm-device-vlan.c
Examining data/network-manager-1.27.91/src/devices/nm-device-veth.c
Examining data/network-manager-1.27.91/src/devices/nm-device-ppp.c
Examining data/network-manager-1.27.91/src/devices/nm-device-ethernet.h
Examining data/network-manager-1.27.91/src/devices/nm-device-tun.h
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.h
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-device-bt.c
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bt-error.c
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-common.h
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bt-error.h
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-device-bt.h
Examining data/network-manager-1.27.91/src/devices/bluetooth/tests/nm-bt-test.c
Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.h
Examining data/network-manager-1.27.91/src/devices/nm-device-vxlan.h
Examining data/network-manager-1.27.91/src/devices/nm-device-wireguard.h
Examining data/network-manager-1.27.91/src/devices/nm-device-dummy.c
Examining data/network-manager-1.27.91/src/devices/nm-device-macsec.h
Examining data/network-manager-1.27.91/src/devices/nm-device-generic.h
Examining data/network-manager-1.27.91/src/devices/nm-device-private.h
Examining data/network-manager-1.27.91/src/devices/nm-device-ppp.h
Examining data/network-manager-1.27.91/src/devices/nm-device-dummy.h
Examining data/network-manager-1.27.91/src/devices/nm-lldp-listener.h
Examining data/network-manager-1.27.91/src/devices/nm-device-macsec.c
Examining data/network-manager-1.27.91/src/devices/adsl/nm-device-adsl.c
Examining data/network-manager-1.27.91/src/devices/adsl/nm-atm-manager.c
Examining data/network-manager-1.27.91/src/devices/adsl/nm-device-adsl.h
Examining data/network-manager-1.27.91/src/devices/nm-device-ethernet-utils.h
Examining data/network-manager-1.27.91/src/devices/nm-device-ip-tunnel.h
Examining data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi-p2p.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-utils.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.h
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-p2p-peer.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-common.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-olpc-mesh.h
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-utils.h
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-ap.h
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-common.h
Examining data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.h
Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-olpc-mesh.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-factory.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.h
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-ap.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi-p2p.h
Examining data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.c
Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-p2p-peer.h
Examining data/network-manager-1.27.91/src/devices/nm-acd-manager.c
Examining data/network-manager-1.27.91/src/devices/nm-device-bridge.h
Examining data/network-manager-1.27.91/src/devices/nm-device-vxlan.c
Examining data/network-manager-1.27.91/src/devices/nm-device-macvlan.c
Examining data/network-manager-1.27.91/src/devices/nm-acd-manager.h
Examining data/network-manager-1.27.91/src/devices/nm-device-bond.h
Examining data/network-manager-1.27.91/src/devices/nm-device-macvlan.h
Examining data/network-manager-1.27.91/src/devices/nm-device-factory.c
Examining data/network-manager-1.27.91/src/devices/nm-device-tun.c
Examining data/network-manager-1.27.91/src/devices/nm-device-6lowpan.h
Examining data/network-manager-1.27.91/src/devices/nm-device-veth.h
Examining data/network-manager-1.27.91/src/devices/nm-device-bond.c
Examining data/network-manager-1.27.91/src/devices/nm-lldp-listener.c
Examining data/network-manager-1.27.91/src/devices/tests/test-lldp.c
Examining data/network-manager-1.27.91/src/devices/tests/test-acd.c
Examining data/network-manager-1.27.91/src/devices/nm-device-wpan.h
Examining data/network-manager-1.27.91/src/devices/nm-device.c
Examining data/network-manager-1.27.91/src/devices/nm-device-bridge.c
Examining data/network-manager-1.27.91/src/devices/team/nm-device-team.h
Examining data/network-manager-1.27.91/src/devices/team/nm-device-team.c
Examining data/network-manager-1.27.91/src/devices/team/nm-team-factory.c
Examining data/network-manager-1.27.91/src/devices/nm-device-ethernet-utils.c
Examining data/network-manager-1.27.91/src/devices/nm-device-vlan.h
Examining data/network-manager-1.27.91/src/nm-active-connection.h
Examining data/network-manager-1.27.91/src/NetworkManagerUtils.h
Examining data/network-manager-1.27.91/src/nm-l3cfg.c
Examining data/network-manager-1.27.91/src/NetworkManagerUtils.c
Examining data/network-manager-1.27.91/src/nm-config-data.c
Examining data/network-manager-1.27.91/src/nm-netns.c
Examining data/network-manager-1.27.91/src/main.c
Examining data/network-manager-1.27.91/src/tests/test-dcb.c
Examining data/network-manager-1.27.91/src/tests/config/nm-test-device.h
Examining data/network-manager-1.27.91/src/tests/config/nm-test-device.c
Examining data/network-manager-1.27.91/src/tests/config/test-config.c
Examining data/network-manager-1.27.91/src/tests/test-utils.c
Examining data/network-manager-1.27.91/src/tests/test-ip6-config.c
Examining data/network-manager-1.27.91/src/tests/test-ip4-config.c
Examining data/network-manager-1.27.91/src/tests/test-core-with-expect.c
Examining data/network-manager-1.27.91/src/tests/test-systemd.c
Examining data/network-manager-1.27.91/src/tests/test-l3cfg.c
Examining data/network-manager-1.27.91/src/tests/test-core.c
Examining data/network-manager-1.27.91/src/tests/test-wired-defname.c
Examining data/network-manager-1.27.91/src/nm-ip6-config.h
Examining data/network-manager-1.27.91/src/ndisc/nm-ndisc.h
Examining data/network-manager-1.27.91/src/ndisc/nm-ndisc.c
Examining data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c
Examining data/network-manager-1.27.91/src/ndisc/nm-ndisc-private.h
Examining data/network-manager-1.27.91/src/ndisc/nm-fake-ndisc.h
Examining data/network-manager-1.27.91/src/ndisc/nm-fake-ndisc.c
Examining data/network-manager-1.27.91/src/ndisc/tests/test-ndisc-linux.c
Examining data/network-manager-1.27.91/src/ndisc/tests/test-ndisc-fake.c
Examining data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.h
Examining data/network-manager-1.27.91/src/nm-dbus-utils.h
Examining data/network-manager-1.27.91/src/nm-checkpoint-manager.c
Examining data/network-manager-1.27.91/src/main-utils.c
Examining data/network-manager-1.27.91/src/nm-ip-config.c
Examining data/network-manager-1.27.91/src/nm-iface-helper.c
Examining data/network-manager-1.27.91/src/nm-session-monitor.c
Examining data/network-manager-1.27.91/src/systemd/nm-sd.h
Examining data/network-manager-1.27.91/src/systemd/nm-sd.c
Examining data/network-manager-1.27.91/src/systemd/nm-sd-utils-dhcp.c
Examining data/network-manager-1.27.91/src/systemd/nm-sd-utils-core.c
Examining data/network-manager-1.27.91/src/systemd/nm-sd-utils-dhcp.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/condition.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/khash.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/device-util.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/sd-device.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/udev-util.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/nm-sd-adapt-core.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/sd-daemon.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/conf-parser.h
Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/nm-sd-adapt-core.c
Examining data/network-manager-1.27.91/src/systemd/nm-sd-utils-core.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-protocol.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-lease-internal.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-ipv4acd.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-protocol.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-ipv4ll.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-network.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-packet.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-lease.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-lease-internal.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-internal.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-internal.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-network.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-lldp.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-network.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-internal.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-network.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/event-util.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/event-source.h
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/event-util.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/sd-id128.c
Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-ipv4ll.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-id128.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-event.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp6-client.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-ipv4acd.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp6-lease.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp-option.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-ndisc.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp-client.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/_sd-common.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp-lease.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-lldp.h
Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp6-option.h
Examining data/network-manager-1.27.91/src/nm-dbus-manager.h
Examining data/network-manager-1.27.91/src/nm-core-utils.h
Examining data/network-manager-1.27.91/src/nm-dcb.c
Examining data/network-manager-1.27.91/src/nm-manager.c
Examining data/network-manager-1.27.91/shared/nm-default.h
Examining data/network-manager-1.27.91/shared/nm-udev-aux/nm-udev-utils.c
Examining data/network-manager-1.27.91/shared/nm-udev-aux/nm-udev-utils.h
Examining data/network-manager-1.27.91/shared/c-siphash/src/c-siphash.h
Examining data/network-manager-1.27.91/shared/c-siphash/src/c-siphash.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-glib.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-ref-string.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-enum-utils.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-random-utils.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-dedup-multi.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-enum-utils.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-errno.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-errno.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-logging-base.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-time-utils.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-logging-base.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-dbus-aux.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-jansson.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-logging-fwd.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-random-utils.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-value-type.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-ref-string.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-obj.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-c-list.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-dbus-aux.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-json-aux.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-time-utils.h
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.c
Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-dedup-multi.c
Examining data/network-manager-1.27.91/shared/nm-test-libnm-utils.h
Examining data/network-manager-1.27.91/shared/nm-version-macros.h
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-probe.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-private.h
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-outgoing.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.h
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.h
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-incoming.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-lease.c
Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4.h
Examining data/network-manager-1.27.91/shared/nm-meta-setting.c
Examining data/network-manager-1.27.91/shared/c-rbtree/src/c-rbtree.c
Examining data/network-manager-1.27.91/shared/c-rbtree/src/c-rbtree-private.h
Examining data/network-manager-1.27.91/shared/c-rbtree/src/c-rbtree.h
Examining data/network-manager-1.27.91/shared/c-list/src/c-list.h
Examining data/network-manager-1.27.91/shared/nm-utils/nm-vpn-plugin-utils.c
Examining data/network-manager-1.27.91/shared/nm-utils/nm-compat.c
Examining data/network-manager-1.27.91/shared/nm-utils/nm-compat.h
Examining data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h
Examining data/network-manager-1.27.91/shared/nm-utils/nm-vpn-plugin-utils.h
Examining data/network-manager-1.27.91/shared/nm-utils/nm-vpn-plugin-macros.h
Examining data/network-manager-1.27.91/shared/nm-utils/nm-vpn-editor-plugin-call.h
Examining data/network-manager-1.27.91/shared/c-stdaux/src/c-stdaux.h
Examining data/network-manager-1.27.91/shared/nm-std-aux/nm-dbus-compat.h
Examining data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h
Examining data/network-manager-1.27.91/shared/nm-std-aux/c-list-util.c
Examining data/network-manager-1.27.91/shared/nm-std-aux/nm-std-utils.c
Examining data/network-manager-1.27.91/shared/nm-std-aux/c-list-util.h
Examining data/network-manager-1.27.91/shared/nm-std-aux/nm-std-utils.h
Examining data/network-manager-1.27.91/shared/nm-std-aux/unaligned.h
Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd.h
Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd-bpf-fallback.c
Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd-private.h
Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c
Examining data/network-manager-1.27.91/shared/n-acd/src/util/timer.c
Examining data/network-manager-1.27.91/shared/n-acd/src/util/timer.h
Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd.c
Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd-bpf.c
Examining data/network-manager-1.27.91/shared/nm-meta-setting.h
Examining data/network-manager-1.27.91/shared/nm-test-utils-impl.c
Examining data/network-manager-1.27.91/shared/systemd/nm-sd-utils-shared.c
Examining data/network-manager-1.27.91/shared/systemd/nm-sd-utils-shared.h
Examining data/network-manager-1.27.91/shared/systemd/nm-logging-stub.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/list.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/sparse-endian.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_fcntl.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/hash-funcs.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/errno-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/cgroup-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/macro.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/time-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/env-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_random.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/mempool.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/env-file.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/prioq.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/set.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/signal-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/format-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/sort-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_stat.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/io-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/escape.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/signal-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/fileio.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/extract-word.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/stdio-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/prioq.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/env-file.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/in-addr-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/hash-funcs.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/stat-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/strv.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_type.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/in-addr-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/async.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/parse-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/memory-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/extract-word.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/strv.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/string-table.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_socket.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/escape.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/string-table.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/mempool.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/umask-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/parse-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/log.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/random-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/stat-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/memory-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/siphash24.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/utf8.h
Examining data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_syscall.h
Examining data/network-manager-1.27.91/shared/systemd/src/shared/web-util.h
Examining data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.h
Examining data/network-manager-1.27.91/shared/systemd/src/shared/web-util.c
Examining data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/gunicode.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/virt.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_timerfd.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/nulstr-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/user-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/def.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/locale-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_keyctl.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_magic.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/architecture.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/memfd-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/glob-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/nm-sd-adapt-shared.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/dhcp-server-internal.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/mkdir.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/rlimit-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/copy.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/arphrd-list.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/build.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/namespace-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/raw-clone.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/ioprio.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_sched.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/blockdev-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_fs.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/terminal-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/dirent-util.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_network.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/errno-list.h
Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/unaligned.h
Examining data/network-manager-1.27.91/dispatcher/nm-dispatcher-utils.c
Examining data/network-manager-1.27.91/dispatcher/nm-dispatcher.c
Examining data/network-manager-1.27.91/dispatcher/nm-dispatcher-utils.h
Examining data/network-manager-1.27.91/dispatcher/tests/test-dispatcher-envp.c

FINAL RESULTS:

data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:307:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
        if (chmod(procfs_path, m) < 0) {
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-writer.c:384:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    if (chown(path, owner_uid, owner_grp) < 0) {
data/network-manager-1.27.91/clients/cli/utils.c:1496:13:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            execlp(pager, pager, NULL);
data/network-manager-1.27.91/clients/cli/utils.c:1497:13:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            execl("/bin/sh", "sh", "-c", pager, NULL);
data/network-manager-1.27.91/clients/cli/utils.c:1506:9:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execlp("pager", "pager", NULL);
data/network-manager-1.27.91/clients/cli/utils.c:1508:9:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execlp("less", "less", NULL);
data/network-manager-1.27.91/clients/cli/utils.c:1509:9:  [4] (shell) execlp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execlp("more", "more", NULL);
data/network-manager-1.27.91/dispatcher/nm-dispatcher.c:77:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            printf(__VA_ARGS__);                                                                       \
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2080:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(key_name, is_route ? "route" : "address");
data/network-manager-1.27.91/shared/c-stdaux/src/c-stdaux.h:64:54:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define _c_printf_(_a, _b) __attribute__((__format__(printf, _a, _b)))
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:254:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            printf(_NM_UTILS_MACRO_FIRST(__VA_ARGS__) "\n" _NM_UTILS_MACRO_REST(__VA_ARGS__)); \
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1331:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(__nmtst_internal.sudo_cmd, argv);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:694:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                if (errno != EROFS || access(filename, F_OK) >= 0)
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1289:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(p, mode) < 0) {
data/network-manager-1.27.91/shared/systemd/src/basic/macro.h:12:50:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define _printf_(a, b) __attribute__((__format__(printf, a, b)))
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:194:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(p, t);
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:604:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                if (access(name, X_OK) < 0)
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:641:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                if (access(j, X_OK) >= 0) {
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:649:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                        if (access(with_dash, X_OK) >= 0)
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:107:47:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                                path_simplify(strcpy(prefix, path), false); \
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:116:47:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                                path_simplify(strcpy(prefix, path), false); \
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:143:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(_p, _path);                              \
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1532:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execv(path, l);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:27:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(stpcpy(_r_, "/proc/self/"), _field_);    \
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:30:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(_r_, "/proc/" PID_FMT "/%s", _pid_, _field_); \
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:288:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access("/proc/net/if_inet6", F_OK) != 0)
data/network-manager-1.27.91/shared/systemd/src/basic/stat-util.c:152:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(path, W_OK) < 0 && errno == EROFS)
data/network-manager-1.27.91/shared/systemd/src/basic/stdio-util.h:13:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ((size_t) snprintf(buf, len, fmt, __VA_ARGS__) < (len))
data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.c:60:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        i = vsnprintf(*dest, size, src, va);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:383:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(buf + n, ".%06"PRI_USEC, t % USEC_PER_SEC);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:413:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(buf + n, tm.tm_zone);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:437:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT " years " USEC_FMT " months %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:441:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT " months " USEC_FMT " days %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:445:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT " weeks " USEC_FMT " days %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:449:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT " days %s", d / USEC_PER_DAY, s);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:454:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT "h %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:457:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT "h " USEC_FMT "min %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:461:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT "min %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:464:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT "min " USEC_FMT "s %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:468:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT "s %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:471:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT "ms %s",
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:474:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
                snprintf(buf, l, USEC_FMT"us %s",
data/network-manager-1.27.91/shared/systemd/src/basic/util.c:81:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                saved_in_initrd = access("/etc/initrd-release", F_OK) >= 0 &&
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:774:14:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if ((f = popen(cmd, "w")) == NULL) {
data/network-manager-1.27.91/src/main.c:327:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(stdout, NM_DIST_VERSION "\n");
data/network-manager-1.27.91/src/nm-config-data.c:729:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(stream,                                      \
data/network-manager-1.27.91/src/nm-iface-helper.c:555:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(stdout, NM_DIST_VERSION "\n");
data/network-manager-1.27.91/src/nm-logging.c:791:9:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
        syslog(level_desc[level].syslog_level, MESSAGE_FMT, MESSAGE_ARG(g->prefix, tv, msg));
data/network-manager-1.27.91/src/platform/nm-fake-platform.c:256:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(link->name, name);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:9543:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(path, W_OK) < 0 && errno == EROFS)
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1760:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ifname_buf_last_try, ifname);
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1779:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(out_ifname, ifname);
data/network-manager-1.27.91/src/platform/nmp-netns.c:534:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access("/sys", W_OK) == -1)
data/network-manager-1.27.91/src/platform/tests/test-common.c:44:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return !nmtstp_is_root_test() || (access("/sys/devices", W_OK) == 0);
data/network-manager-1.27.91/src/platform/tests/test-common.c:712:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    result = system(command);
data/network-manager-1.27.91/src/platform/tests/test-link.c:528:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    return system(cmd);
data/network-manager-1.27.91/src/platform/tests/test-link.c:2747:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access("/proc/sys/net/ipv4/ip_forward", W_OK) == -1) {
data/network-manager-1.27.91/src/platform/tests/test-link.c:3484:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    proc_writable = access(PATH, W_OK) == 0;
data/network-manager-1.27.91/src/platform/tests/test-nmp-object.c:582:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access("/sys", W_OK) == 0)
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:6401:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                    if (access(p_path, X_OK) == 0) {
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:92:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(dst, *src);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:96:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(dst, *src);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:801:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf(f, "%s/%" PRIu8, inet_ntop(AF_INET, &dest, sbuf, sizeof sbuf), length);
data/network-manager-1.27.91/src/systemd/src/systemd/_sd-common.h:30:56:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#    define _sd_printf_(a,b) __attribute__((__format__(printf, a, b)))
data/network-manager-1.27.91/src/tests/test-core.c:1766:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(str, STR_ORIG);
data/network-manager-1.27.91/src/tests/test-core.c:1772:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buf, BUF_ORIG);
data/network-manager-1.27.91/clients/cli/connections.c:6587:33:  [3] (buffer) g_get_home_dir:
  This function is synonymous with 'getenv("HOME")';it returns untrustable
  input if the environment can beset by an attacker. It can have any content
  and length, and the same variable can be set more than once (CWE-807,
  CWE-20). Check environment variables carefully before using them.
    filename = g_build_filename(g_get_home_dir(), NMCLI_EDITOR_HISTORY, NULL);
data/network-manager-1.27.91/clients/cli/connections.c:6623:33:  [3] (buffer) g_get_home_dir:
  This function is synonymous with 'getenv("HOME")';it returns untrustable
  input if the environment can beset by an attacker. It can have any content
  and length, and the same variable can be set more than once (CWE-807,
  CWE-20). Check environment variables carefully before using them.
    filename = g_build_filename(g_get_home_dir(), NMCLI_EDITOR_HISTORY, NULL);
data/network-manager-1.27.91/clients/cli/devices.c:4018:13:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        c = g_random_int_range(33, 126);
data/network-manager-1.27.91/clients/cli/devices.c:4021:17:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            c = g_random_int_range(33, 126);
data/network-manager-1.27.91/clients/cli/devices.c:4040:18:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        digit  = g_random_int_range(0, 16);
data/network-manager-1.27.91/clients/cli/utils.c:1450:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *pager = getenv("PAGER");
data/network-manager-1.27.91/clients/common/nm-polkit-listener.c:175:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    user = getenv("USER");
data/network-manager-1.27.91/dispatcher/nm-dispatcher.c:671:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        real = realpath(dir, NULL);
data/network-manager-1.27.91/libnm-core/nm-utils.c:466:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    lang = getenv("LC_ALL");
data/network-manager-1.27.91/libnm-core/nm-utils.c:468:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        lang = getenv("LC_CTYPE");
data/network-manager-1.27.91/libnm-core/nm-utils.c:470:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        lang = getenv("LANG");
data/network-manager-1.27.91/libnm-core/tests/test-general.c:4710:25:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            guint32 r = g_rand_int(rand);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:8295:23:  [3] (random) g_rand_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            numbits = g_rand_int_range(rand, 1, 65);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:8297:47:  [3] (random) g_rand_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                guint64 v = (((guint64) 1) << g_rand_int_range(rand, 0, 64));
data/network-manager-1.27.91/libnm/nm-libnm-aux/nm-libnm-aux.c:104:10:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    if ((g_random_int() % 2) == 0) {
data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:173:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                uint64_t random;
data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:176:27:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                n_time += random % n_jitter;
data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:76:43:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
static int n_acd_get_random(unsigned int *random) {
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-probe.c:375:16:  [3] (random) jrand48:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        return jrand48(config->entropy);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-random-utils.c:135:24:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                .v32 = g_rand_int(rand),
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:866:20:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            seed = g_rand_int(__nmtst_internal.rand);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:889:12:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return g_rand_int(nmtst_get_rand());
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:897:24:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return (((guint64) g_rand_int(rand))) | (((guint64) g_rand_int(rand)) << 32);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:897:57:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return (((guint64) g_rand_int(rand))) | (((guint64) g_rand_int(rand)) << 32);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:938:13:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        v = g_rand_int(rand);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:942:13:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        v = g_rand_int(rand);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:984:13:  [3] (random) g_rand_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        j = g_rand_int_range(rand, 0, i);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1016:33:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        tmp = g_slist_nth(list, g_rand_int(rand) % l);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1081:23:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        guint32 rnd = g_rand_int(rand);
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:456:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                return getenv(t);
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:740:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        e = getenv(p);
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:619:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                p = getenv("PATH");
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:857:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                e = getenv(field);
data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c:353:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand(x);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient.c:465:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    system_bus_address = getenv("DBUS_SYSTEM_BUS_ADDRESS");
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhcpcanon.c:130:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    system_bus_address = getenv("DBUS_SYSTEM_BUS_ADDRESS");
data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper.c:109:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    pid_str = getenv("pid");
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:877:28:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
            rc_path_real = realpath(_PATH_RESCONF, NULL);
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:1996:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        real_path = realpath(_PATH_RESCONF, NULL);
data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:117:57:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (nm_logging_enabled(LOGL_TRACE, LOGD_SHARING) || getenv("NM_DNSMASQ_DEBUG")) {
data/network-manager-1.27.91/src/main.c:86:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *env = getenv("NM_DEBUG");
data/network-manager-1.27.91/src/main.c:354:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        path = realpath("/proc/self/exe", NULL);
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:872:35:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            g_timeout_add_seconds(g_random_int_range(NM_NDISC_ROUTER_ADVERT_DELAY,
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:908:35:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            g_timeout_add_seconds(g_random_int_range(0, NM_NDISC_ROUTER_ADVERT_DELAY),
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:926:42:  [3] (random) g_random_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        priv->send_ra_id = g_timeout_add(g_random_int_range(0, NM_NDISC_ROUTER_ADVERT_DELAY_MS),
data/network-manager-1.27.91/src/nm-core-utils.c:3855:20:  [3] (random) g_random_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        oui = ouis[g_random_int() % ouis_len];
data/network-manager-1.27.91/src/ppp/nm-ppp-manager.c:798:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    ppp_debug = !!getenv("NM_PPP_DEBUG");
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:485:21:  [3] (random) g_rand_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            itest = g_rand_int_range(rand, 0, max_test_idx);
data/network-manager-1.27.91/src/tests/test-core.c:52:33:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        ((guint32 *) addr)[i] = g_rand_int(r);
data/network-manager-1.27.91/src/tests/test-core.c:1108:17:  [3] (random) g_rand_int:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            j = g_rand_int(nmtst_get_rand()) % (i + 1);
data/network-manager-1.27.91/src/tests/test-ip6-config.c:265:21:  [3] (random) g_rand_int_range:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            int j = g_rand_int_range(nmtst_get_rand(), i, addr_count);
data/network-manager-1.27.91/clients/cli/common.c:976:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&rl_line_buffer[i], subst, subst_len);
data/network-manager-1.27.91/clients/cli/connections.c:3768:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char prompt[128] = {0};
data/network-manager-1.27.91/clients/cli/connections.c:6639:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char key[100];
data/network-manager-1.27.91/clients/cli/connections.c:9398:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
    char                  tmpfile[] = "/tmp/nmcli-export-temp-XXXXXX";
data/network-manager-1.27.91/clients/cli/connections.c:9465:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        fd = g_mkstemp_full(tmpfile, O_RDWR | O_CLOEXEC, 0600);
data/network-manager-1.27.91/clients/cli/connections.c:9469:29:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
                            tmpfile);
data/network-manager-1.27.91/clients/cli/connections.c:9473:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
        path = tmpfile;
data/network-manager-1.27.91/clients/cli/devices.c:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *flags_str[16];
data/network-manager-1.27.91/clients/cli/devices.c:1061:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sorted, devs->pdata, devs->len * sizeof(NMDevice *));
data/network-manager-1.27.91/clients/cli/devices.c:1364:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *caps_str[8]; /* Enough space for caps and terminating NULL */
data/network-manager-1.27.91/clients/cli/devices.c:4054:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        generated_key[11];
data/network-manager-1.27.91/clients/cli/nmcli.c:159:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *option_with_value[2] = {option, prefix};
data/network-manager-1.27.91/clients/cli/nmcli.c:527:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *             tmp_palette[_NM_META_COLOR_NUM] = {DEFAULT_PALETTE_INIT};
data/network-manager-1.27.91/clients/cli/nmcli.c:528:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char *const map[_NM_META_COLOR_NUM]         = {
data/network-manager-1.27.91/clients/cli/nmcli.c:652:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(palette, tmp_palette, sizeof(tmp_palette));
data/network-manager-1.27.91/clients/cli/nmcli.h:100:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *palette[_NM_META_COLOR_NUM]; /* Color palette */
data/network-manager-1.27.91/clients/cli/settings.c:230:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               str[16];
data/network-manager-1.27.91/clients/cli/utils.c:365:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char slashes[4] = {'|', '/', '-', '\\'};
data/network-manager-1.27.91/clients/cli/utils.c:1115:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    if (value && ((const char *const *) value)[0]) {
data/network-manager-1.27.91/clients/cli/utils.c:1424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/network-manager-1.27.91/clients/cli/utils.c:1645:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                for (p = (const char **) field_values[idx].value, j = 1; p && *p; p++, j++) {
data/network-manager-1.27.91/clients/cli/utils.c:1653:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        section_prefix ? (const char *) field_values[0].value : "",
data/network-manager-1.27.91/clients/cli/utils.c:1669:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                const char *  hdr_name    = (const char *) field_values[0].value;
data/network-manager-1.27.91/clients/cli/utils.c:1670:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                const char *  val         = (const char *) field_values[idx].value;
data/network-manager-1.27.91/clients/cloud-setup/main.c:327:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char             sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:268:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) line)[line_len] = '\0';
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:271:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            ((char *) line)[--line_len] = '\0';
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:280:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                buf[100];
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:309:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                buf[30];
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:343:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  buf[100];
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:436:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) line)[line_len] = '\0';
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:439:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            ((char *) line)[--line_len] = '\0';
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:467:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                buf[100];
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.c:276:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   path[0];
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.c:442:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) cur_line)[cur_line_len] = '\0';
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.c:455:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(mac_data->path, cur_line, cur_line_len + 1u);
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:223:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) line)[line_len] = '\0';
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:281:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  sbuf[100];
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:362:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) line)[line_len] = '\0';
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:364:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            ((char *) line)[--line_len] = '\0';
data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:386:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                sbuf[100];
data/network-manager-1.27.91/clients/common/nm-client-utils.c:772:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                ((char *) s)[0] = '\0';
data/network-manager-1.27.91/clients/common/nm-client-utils.c:775:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                ((char *) s)[0] = '\0';
data/network-manager-1.27.91/clients/common/nm-client-utils.c:800:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) s)[0] = '\0';
data/network-manager-1.27.91/clients/common/nm-client-utils.c:823:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) s)[0] = '\0';
data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:413:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            &((char *)
data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:417:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pdata, str->str, str->len);
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:1084:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                                 s_numeric[64];
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:1970:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            nm_utils_escaped_tokens_options_split((char *) strv[i], &opt_name, &opt_value);
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2891:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
dcb_parse_uint_array(const char *val,
data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:321:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    key[100];
data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:527:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           read_buf[5];
data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                                 ifname[IFNAMSIZ];
data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:378:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ifname, cstr, len);
data/network-manager-1.27.91/clients/common/qrcodegen.c:78:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void addRunToHistory(unsigned char run, unsigned char history[7]);
data/network-manager-1.27.91/clients/common/qrcodegen.c:78:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void addRunToHistory(unsigned char run, unsigned char history[7]);
data/network-manager-1.27.91/clients/common/qrcodegen.c:79:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static bool hasFinderLikePattern(unsigned char runHistory[7]);
data/network-manager-1.27.91/clients/common/qrcodegen.c:735:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char runHistory[7] = {0};
data/network-manager-1.27.91/clients/common/qrcodegen.c:761:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char runHistory[7] = {0};
data/network-manager-1.27.91/clients/common/qrcodegen.c:814:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
addRunToHistory(unsigned char run, unsigned char history[7])
data/network-manager-1.27.91/clients/common/qrcodegen.c:814:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
addRunToHistory(unsigned char run, unsigned char history[7])
data/network-manager-1.27.91/clients/common/qrcodegen.c:824:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
hasFinderLikePattern(unsigned char runHistory[7])
data/network-manager-1.27.91/clients/common/qrcodegen.c:979:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, data, len * sizeof(buf[0]));
data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry-numeric.c:129:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[32];
data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:52:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    gboolean open;
data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:228:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (priv->open) {
data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:253:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (priv->open)
data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:309:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (priv->open) {
data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:351:42:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        g_value_set_boolean(value, priv->open);
data/network-manager-1.27.91/clients/tui/newt/nmt-newt-utils.c:299:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *  filename, *argv[3];
data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.c:201:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char input[66];
data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.c:212:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(input, g_bytes_get_data(ssid, NULL), g_bytes_get_size(ssid));
data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.c:239:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&input[33], &input[0], 32);
data/network-manager-1.27.91/clients/tui/nmt-mtu-entry.c:64:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if (*text && !atoi(text)) {
data/network-manager-1.27.91/clients/tui/nmtui.c:262:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    argv[0] = (char *) subprograms[i].shortcut;
data/network-manager-1.27.91/dispatcher/nm-dispatcher.c:495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *                argv[4];
data/network-manager-1.27.91/dispatcher/tests/test-dispatcher-envp.c:270:59:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            addr = nm_ip_address_new(AF_INET, ip, (guint) atoi(prefix), error);
data/network-manager-1.27.91/dispatcher/tests/test-dispatcher-envp.c:321:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                                    (guint) atoi(metric),
data/network-manager-1.27.91/examples/C/glib/get-ap-info-libnm.c:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *flags_str[16]; /* Enough space for flags and terminating NULL */
data/network-manager-1.27.91/examples/C/glib/list-connections-libnm.c:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 timestamp_real_str[64];
data/network-manager-1.27.91/libnm-core/nm-connection.c:706:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 uuid[37];
data/network-manager-1.27.91/libnm-core/nm-connection.c:992:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char            normalized[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-core-internal.h:666:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                            char                   out_xifname[static 16]);
data/network-manager-1.27.91/libnm-core/nm-crypto-gnutls.c:224:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(padded_buf.bin, data, data_len);
data/network-manager-1.27.91/libnm-core/nm-crypto-nss.c:339:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(padded_buf.bin, data, data_len);
data/network-manager-1.27.91/libnm-core/nm-crypto-nss.c:448:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pw.data, ucs2_password.bin, ucs2_password.len);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:1075:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ret->bin[ret_idx], line, line_l);
data/network-manager-1.27.91/libnm-core/nm-errors.c:30:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char              error_name[200];
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:602:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, key, sizeof(char) * i);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:907:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char options_key[128];
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1075:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          addr_str[NM_UTILS_HWADDR_LEN_MAX * 3];
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1483:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pathuri,
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1486:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pathuri[NM_STRLEN(NM_KEYFILE_CERT_SCHEME_PREFIX_PATH)], path, path_len + 1);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1997:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char             kf_key[32];
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2074:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                     key_name[64];
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2122:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(key_name_idx, "%u", i + 1);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               key_name_full[100] = "routing-rule";
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2280:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(key_name_num, "%u", ++j);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:3696:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                     numstr[64];
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:3845:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                 group[NM_STRLEN(NM_KEYFILE_GROUPPREFIX_WIREGUARD_PEER) + 200];
data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-libnm-core-aux.c:153:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *
data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-libnm-core-aux.c:290:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) val)[0] = '\0';
data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.c:114:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *const nm_auth_permission_names_by_idx[NM_CLIENT_PERMISSION_LAST] = {
data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.h:128:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *const        nm_auth_permission_names_by_idx[NM_CLIENT_PERMISSION_LAST];
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:348:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(mem,
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:351:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&mem[NM_STRLEN(NM_SETTING_802_1X_CERT_SCHEME_PREFIX_PATH)], val_bin, val_len);
data/network-manager-1.27.91/libnm-core/nm-setting-dcb.c:715:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(a, src->data, total_len);
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:146:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[64];
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:229:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         string[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:475:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:936:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2230:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   char                   out_xifname[static 16 /* IFNAMSIZ */])
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2794:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        nm_assert(g_variant_type_string_is_valid((const char *) rr_dbus_data[attr].dbus_type));
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2837:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        (const char *) rr_dbus_data[attr].dbus_type,
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2964:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:3186:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *str_word = (char *) tokens[i_token];
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:3485:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-ip6-config.c:268:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char            s_token[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-team.c:205:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    str = &((char *) watcher)[nm_offsetofend(NMTeamLinkWatcher, nsna_ping)];
data/network-manager-1.27.91/libnm-core/nm-setting-team.c:207:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(str, target_host, l_target_host);
data/network-manager-1.27.91/libnm-core/nm-setting-team.c:348:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    str = &((char *) watcher)[nm_offsetofend(NMTeamLinkWatcher, arp_ping)];
data/network-manager-1.27.91/libnm-core/nm-setting-team.c:350:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(str, target_host, l_target_host);
data/network-manager-1.27.91/libnm-core/nm-setting-team.c:354:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(str, source_host, l_source_host);
data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.c:635:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char addrstr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.c:1534:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                ((const char **) strv)[i]++;
data/network-manager-1.27.91/libnm-core/nm-team-utils.c:1952:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *keys[3];
data/network-manager-1.27.91/libnm-core/nm-utils.c:162:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ep->endpoint, endpoint, l_endpoint);
data/network-manager-1.27.91/libnm-core/nm-utils.c:165:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ep->endpoint[i], host, l_host);
data/network-manager-1.27.91/libnm-core/nm-utils.c:458:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *             default_encodings[4];
data/network-manager-1.27.91/libnm-core/nm-utils.c:673:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char   escaped[ESSID_MAX_SIZE * 2 + 1];
data/network-manager-1.27.91/libnm-core/nm-utils.c:678:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(escaped, "<hidden>", sizeof("<hidden>"));
data/network-manager-1.27.91/libnm-core/nm-utils.c:4745:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static _nm_thread_local char _nm_utils_inet_ntop_buffer[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/nm-utils.c:5016:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[1];
data/network-manager-1.27.91/libnm-core/nm-utils.c:5098:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&k->data[0], v1, l1);
data/network-manager-1.27.91/libnm-core/nm-utils.c:5100:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&k->data[l1], v2, l2);
data/network-manager-1.27.91/libnm-core/nm-utils.c:5782:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_key, bin_arr, required_key_len);
data/network-manager-1.27.91/libnm-core/nm-vpn-editor-plugin.c:212:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(vt, p_vt, MIN(vt_size, p_vt_size));
data/network-manager-1.27.91/libnm-core/nm-vpn-plugin-info.c:340:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        if (!dir[i] || nm_utils_strv_find_first((char **) dir, i, dir[i]) >= 0)
data/network-manager-1.27.91/libnm-core/tests/test-crypto.c:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char digest[LONG_DIGEST], *hex;
data/network-manager-1.27.91/libnm-core/tests/test-general.c:743:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     random_token[2] = {0};
data/network-manager-1.27.91/libnm-core/tests/test-general.c:1718:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *        to_del[TO_DEL_NUM];
data/network-manager-1.27.91/libnm-core/tests/test-general.c:3229:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 buf[9] = {0x61, 0x62, 0x63, 0xff, 0xfe, 0xfd, 0x23, 0x01, 0x00};
data/network-manager-1.27.91/libnm-core/tests/test-general.c:3304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *   perms[2];
data/network-manager-1.27.91/libnm-core/tests/test-general.c:3335:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[9] = {0x61, 0x62, 0x63, 0xff, 0xfe, 0xfd, 0x23, 0x01, 0x00};
data/network-manager-1.27.91/libnm-core/tests/test-general.c:7419:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  i_str[30];
data/network-manager-1.27.91/libnm-core/tests/test-general.c:9701:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd_1 = open("/dev/null", O_RDONLY | O_CLOEXEC);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:9711:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd_2 = open("/dev/null", O_RDONLY | O_CLOEXEC);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:9739:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:2925:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            g_hash_table_insert(hash, (char *) opt_keys[i], opt_vals[i]);
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:3463:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char addrstr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:3777:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                                           ifname_buf[16];
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:3987:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                     sbuf[300];
data/network-manager-1.27.91/libnm/nm-client.c:6261:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(priv->nm.capabilities_arr, arr, len * sizeof(guint32));
data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:542:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(node->sender, packet->arp_sha, ETH_ALEN);
data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:617:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(node->sender, packet->arp_sha, ETH_ALEN);
data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:629:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(node->sender, packet->arp_sha, ETH_ALEN);
data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:249:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(config->mac, mac, n_mac > ETH_ALEN ? ETH_ALEN : n_mac);
data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:346:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(acd->mac, config->mac, ETH_ALEN);
data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:498:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(arp.arp_sha, acd->mac, sizeof(acd->mac));
data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:499:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(arp.arp_tpa, &tpa->s_addr, sizeof(uint32_t));
data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:502:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(arp.arp_spa, &spa->s_addr, sizeof(spa->s_addr));
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:432:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(header->chaddr, connection->client_config->mac, ETH_ALEN);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1005:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char server_addr[INET_ADDRSTRLEN];
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1006:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char client_addr[INET_ADDRSTRLEN];
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1007:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char error_msg[128];
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1149:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char serv_addr[INET_ADDRSTRLEN];
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1150:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char client_addr[INET_ADDRSTRLEN];
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-lease.c:265:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addr, data, sizeof(struct in_addr));
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-probe.c:35:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(op->data, data, n_data);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-probe.c:362:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(config->entropy, seed16v, sizeof(seed16v));
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c:190:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(config->mac, mac, n_mac);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c:220:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(config->broadcast_mac, mac, n_mac);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c:253:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(t, id, n_id);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-incoming.c:55:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy((uint8_t *)&incoming->message + *offset, raw + pos, l);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-incoming.c:211:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&incoming->message, raw, n_raw);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-outgoing.c:159:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blob + outgoing->i_message, data, n_data);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c:356:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(haddr.sll_addr, dest_haddr, halen);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c:507:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char buf[CMSG_SPACE(sizeof(struct in_pktinfo))];
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c:526:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(CMSG_DATA(cmsg), &pktinfo, sizeof(pktinfo));
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c:627:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pktinfo, (void*)CMSG_DATA(cmsg), sizeof(struct in_pktinfo));
data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.c:49:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&local, data, size);
data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.c:134:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&local, data, size);
data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.h:27:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char   sll_addr[32]; /* MAX_ADDR_LEN */
data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c:33:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_SIOCGIFNAME(int socket, int ifindex, char (*ifnamep)[IFNAMSIZ]) {
data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c:46:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ifnamep, req.ifr_name, IFNAMSIZ);
data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c:64:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ifname[IFNAMSIZ] = {};
data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.h:10:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int socket_SIOCGIFNAME(int socket, int ifindex, char (*ifnamep)[IFNAMSIZ]);
data/network-manager-1.27.91/shared/nm-default.h:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_buf[256 + 15];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-enum-utils.c:304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        sbuf[64];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.c:70:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(g_arr.v8, t_arr.v8, HASH_KEY_SIZE);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.c:124:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&seed, g, HASH_KEY_SIZE);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h:419:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline const char *
data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h:420:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
nm_hash_obfuscated_ptr_str(gconstpointer ptr, char buf[static 17])
data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:32:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          bstrerr[NM_STRERROR_BUFSIZE];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:163:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                 buf[4096];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:235:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(str + n_have, buf, n_read);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:313:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(filename, O_RDONLY | O_CLOEXEC);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.h:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char source[NM_JSON_ERROR_SOURCE_LENGTH];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.h:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[NM_JSON_ERROR_TEXT_LENGTH];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c:91:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(self->filename, filename, l_filename + 1);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c:93:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) self->group_name, group_name, l_group + 1);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:738:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ((const char *const[(sizeof(((const char *const[]){__VA_ARGS__})) / sizeof(const char *)) \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1371:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s, str, l);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1496:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, data, size);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1554:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(_ptr_md, (data), _size);                                   \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1697:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&_buf[1], _str, _strlen_trunc);                       \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-random-utils.c:100:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open("/dev/urandom", O_RDONLY | O_CLOEXEC | O_NOCTTY);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-ref-string.c:141:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rstr0->str_data, cstr, len);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.c:111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(b->bin, mem, mem_len);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h:129:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char   str[0];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h:182:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(m_new, m_old, NM_MIN(cur_len, new_len));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h:220:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(m_new, m_old, NM_MIN(cur_len, new_len));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h:258:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(m_new, m_old, NM_MIN(cur_len, new_len));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:27:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char _nm_hexchar_table_lower[16] = "0123456789abcdef";
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:28:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char _nm_hexchar_table_upper[16] = "0123456789ABCDEF";
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:93:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, src_len);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:196:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*buf, str, *len - 1);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:201:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*buf, str, str_len);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:714:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dst, src, nbytes);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:932:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[INET_ADDRSTRLEN];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:954:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     addrstr_buf[MAX(INET_ADDRSTRLEN, INET6_ADDRSTRLEN)];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1021:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     addrstr_buf[MAX(INET_ADDRSTRLEN, INET6_ADDRSTRLEN)];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1097:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1699:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s, str, str_len_p1);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1746:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            s = (char *) nm_str_skip_leading_spaces(ptr[i]);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1779:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            s = (char *) ptr[i_token];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3597:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            v[i] = (char *) strv[i];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3652:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    sbuf   = &(((char *) result)[pre_len]);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3671:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sbuf, strv[i], l);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3676:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    nm_assert(sbuf == (&((const char *) result)[pre_len]) + mem_len);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3812:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        cmp = cmpfcn(&((const char *) list)[elem_size * imid], needle, user_data);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3903:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 filename[256];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                                 buf[64];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5542:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          buf_stack[4096];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5576:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          buf_stack[4096];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:174:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, (addr_family != AF_INET6) ? sizeof(in_addr_t) : sizeof(struct in6_addr));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:230:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline const char *
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:231:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_nm_utils_inet4_ntop(in_addr_t addr, char dst[static INET_ADDRSTRLEN])
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:236:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline const char *
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:237:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_nm_utils_inet6_ntop(const struct in6_addr *addr, char dst[static INET6_ADDRSTRLEN])
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:739:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char _nm_utils_to_string_buffer[2096];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1008:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char _bstrerr[NM_STRERROR_BUFSIZE];                                                       \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1868:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char _nm_hexchar_table_lower[16];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1869:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char _nm_hexchar_table_upper[16];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1904:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline const char *
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1905:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
nm_ether_addr_to_string(const NMEtherAddr *ether_addr, char sbuf[static(sizeof(NMEtherAddr) * 3)])
data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h:209:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&strbuf->_priv_str[strbuf->_priv_len], str, len);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h:224:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&strbuf->_priv_str[strbuf->_priv_len], str, len);
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:344:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *const strv0[1] = {};
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:345:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *const strv1[2] = {
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:474:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char     strbuf1[G_N_ELEMENTS(buf) * 3];
data/network-manager-1.27.91/shared/nm-udev-aux/nm-udev-utils.c:57:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(unescaped, uproperty, l);
data/network-manager-1.27.91/shared/nm-utils/nm-compat.c:46:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(keys, a->pdata, a->len * sizeof(gpointer));
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:939:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(b, &v, sizeof(guint32));
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:975:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, src, elmt_size * n_elmt);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:990:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(bu, p_, elmt_size);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:991:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p_, pj, elmt_size);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:992:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pj, bu, elmt_size);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1385:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static _nm_thread_local char buf[SIZE];                            \
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1404:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static _nm_thread_local char u[37];
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1479:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static _nm_thread_local char buf[NM_CONST_MAX(INET6_ADDRSTRLEN, INET_ADDRSTRLEN)];
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1506:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[100];
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1530:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[100];
data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.c:22:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, p, l);
data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.h:69:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(_q_, p, _l_);            \
data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.h:79:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(_q_, p, _l_);            \
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:715:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                memcpy(ret + k, m, q * sizeof(char*));
data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:311:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(r, prefix, pl);
data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:428:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ans + off, "...", c);
data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.c:14:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char* ether_addr_to_string(const struct ether_addr *addr, char buffer[ETHER_ADDR_TO_STRING_MAX]) {
data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.c:22:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer, "%02x:%02x:%02x:%02x:%02x:%02x",
data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.h:13:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char* ether_addr_to_string(const struct ether_addr *addr, char buffer[ETHER_ADDR_TO_STRING_MAX]);
data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:384:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:478:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                r = open("/dev/null", O_RDONLY|O_CLOEXEC|O_NOCTTY);
data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:546:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                fd = open("/dev/shm", O_RDWR|O_TMPFILE|O_CLOEXEC, 0500);
data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:577:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                r = open(pattern, O_RDONLY|O_CLOEXEC);
data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:855:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                null_fd = open("/dev/null", (null_readable && null_writable ? O_RDWR :
data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:937:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:948:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        new_fd = open(procfs_path, flags);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:37:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *f = fopen(path, options);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:256:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(fn, O_WRONLY|O_CLOEXEC|O_NOCTTY |
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:387:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(filename, O_RDONLY|O_CLOEXEC);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:631:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:845:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                f = fopen(path, mode);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:889:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                f = fopen(p, mode);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:912:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                f = fopen(path, mode);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:934:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                f = fopen(path, mode);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:1026:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ln[DECIMAL_STR_MAX(n)+2];
data/network-manager-1.27.91/shared/systemd/src/basic/format-util.c:10:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *format_ifname_full(int ifindex, char buf[static IF_NAMESIZE + 1], FormatIfnameFlag flag) {
data/network-manager-1.27.91/shared/systemd/src/basic/format-util.c:10:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *format_ifname_full(int ifindex, char buf[static IF_NAMESIZE + 1], FormatIfnameFlag flag) {
data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h:64:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *format_ifname_full(int ifindex, char buf[static IF_NAMESIZE + 1], FormatIfnameFlag flag);
data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h:64:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *format_ifname_full(int ifindex, char buf[static IF_NAMESIZE + 1], FormatIfnameFlag flag);
data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h:65:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline char *format_ifname(int ifindex, char buf[static IF_NAMESIZE + 1]) {
data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h:65:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline char *format_ifname(int ifindex, char buf[static IF_NAMESIZE + 1]) {
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:226:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(path, O_PATH|O_CLOEXEC|O_NOFOLLOW); /* Let's acquire an O_PATH fd, as precaution to change
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:300:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:321:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:372:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fdpath[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:389:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(path, O_PATH|O_CLOEXEC|O_NOFOLLOW);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:396:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                fd = open(path, O_WRONLY|O_CREAT|O_EXCL|O_CLOEXEC, IN_SET(mode, 0, MODE_INVALID) ? 0644 : mode);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:702:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int) + 1];
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:844:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                r = open(path, O_PATH|O_CLOEXEC|((flags & CHASE_NOFOLLOW) ? O_NOFOLLOW : 0));
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:878:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(root ?: "/", O_CLOEXEC|O_DIRECTORY|O_PATH);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1062:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                                fd = open(root ?: "/", O_CLOEXEC|O_DIRECTORY|O_PATH);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1174:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                r = open(path, open_flags);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1203:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1284:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char p[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(fd) + 1];
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1370:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buffer[64 * 1024];
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1480:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        opened_fd = open(".", O_RDONLY|O_DIRECTORY|O_CLOEXEC);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1538:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(parent, flags, mode);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1615:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char p[SYS_BLOCK_PATH_MAX(NULL)];
data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.c:372:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hash_key, current, sizeof(current));
data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.c:472:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(e_to, e_from, hashmap_type_info[h->type].entry_size);
data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.c:1108:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(new_storage, h->direct.storage,
data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:41:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static const char table[16] = "0123456789abcdef";
data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:175:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static const char table[32] = "0123456789"
data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:526:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static const char table[64] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:639:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(s, x + width * line, act);
data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.c:235:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[HOST_NAME_MAX + 1] = {};
data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.c:328:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen(path, "re");
data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c:25:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[LINE_MAX];
data/network-manager-1.27.91/shared/systemd/src/basic/macro.h:418:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char x[(expr) ? 0 : -1];                                \
data/network-manager-1.27.91/shared/systemd/src/basic/memory-util.h:23:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, src, n);
data/network-manager-1.27.91/shared/systemd/src/basic/missing_socket.h:16:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char svm_zero[sizeof(struct sockaddr) -
data/network-manager-1.27.91/shared/systemd/src/basic/missing_syscall.h:213:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char f_handle[0];
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:941:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(mempcpy(ret, path, e + 1 - path), filename, k + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1496:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                fd = open("/dev/tty", O_WRONLY);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1537:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char t[DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1539:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(t, "%i", value);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1546:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[STRLEN("/proc/self/fdinfo/") + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c:210:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(p, &u, m);
data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c:307:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open("/dev/urandom", O_RDONLY|O_CLOEXEC|O_NOCTTY);
data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c:484:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(info->buf, seed, size);
data/network-manager-1.27.91/shared/systemd/src/basic/signal-util.c:213:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static thread_local char buf[STRLEN("RTMIN+") + DECIMAL_STR_MAX(int) + 1];
data/network-manager-1.27.91/shared/systemd/src/basic/siphash24.h:75:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static inline uint64_t siphash24_string(const char *s, const uint8_t k[static 16]) {
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:408:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char a[INET6_ADDRSTRLEN], ifname[IF_NAMESIZE + 1];
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:545:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char host[NI_MAXHOST], *ret;
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:891:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(CMSG_DATA(cmsg), &fd, sizeof(int));
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:1152:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ret->sun_path + 1, path + 1, l); /* copy *with* trailing NUL byte */
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:1159:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ret->sun_path, path, l + 1); /* copy *with* trailing NUL byte */
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:1176:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ifname[IF_NAMESIZE + 1];
data/network-manager-1.27.91/shared/systemd/src/basic/stat-util.c:236:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(path, O_RDONLY|O_CLOEXEC|O_NOCTTY|O_PATH);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:141:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(r, s, a);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:142:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(r+a, suffix, b);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:439:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(t, s, x);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:442:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(t + x + 3, s + old_length - suffix_len, suffix_len);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:538:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(e, s, len);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:540:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(e + len + 3, j, len2);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:564:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char four[4];
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:576:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buf + i, four, w);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:689:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *strip_tab_ansi(char **ibuf, size_t *_isz, size_t highlight[2]) {
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:689:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *strip_tab_ansi(char **ibuf, size_t *_isz, size_t highlight[2]) {
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:180:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *strip_tab_ansi(char **ibuf, size_t *_isz, size_t highlight[2]);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:180:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *strip_tab_ansi(char **ibuf, size_t *_isz, size_t highlight[2]);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:242:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                if (ascii_tolower(((char *)p)[i]) != ascii_tolower(token[i]))
data/network-manager-1.27.91/shared/systemd/src/basic/strv.c:736:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(m + n, *i, z + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:360:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(buf, "--- XXXX-XX-XX XX:XX:XX");
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:371:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, weekdays[tm.tm_wday], 4);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:394:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(buf + n, " UTC");
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:1285:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen("/usr/share/zoneinfo/zone1970.tab", "re");
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:1345:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4];
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:1383:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(t, O_RDONLY|O_CLOEXEC);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:129:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(stpcpy(stpcpy(stpcpy(mempcpy(t, p, fn - p), ".#"), extra), fn), "XXXXXX");
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:238:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(directory, flags|O_TMPFILE|O_EXCL, S_IRUSR|S_IWUSR);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:280:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(tmp, O_CREAT|O_EXCL|O_NOFOLLOW|O_NOCTTY|flags, 0640);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:307:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char proc_fd_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(fd) + 1];
data/network-manager-1.27.91/shared/systemd/src/basic/util.c:103:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char contents[6];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:321:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[DNS_LABEL_MAX+1];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:357:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(decoded, buffer, l);
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:401:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(decoded, result, w);
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:427:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char label[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:456:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char escaped[DNS_LABEL_ESCAPED_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:501:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char label[DNS_LABEL_MAX+1];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:529:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char la[DNS_LABEL_MAX], lb[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:554:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char la[DNS_LABEL_MAX], lb[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:585:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char ln[DNS_LABEL_MAX], ls[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:623:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char ln[DNS_LABEL_MAX], lp[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:655:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char ln[DNS_LABEL_MAX], ls[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:766:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char label[DNS_LABEL_MAX+1];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:802:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char label[DNS_LABEL_MAX+1];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:947:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char label[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:999:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char escaped[DNS_LABEL_ESCAPED_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1042:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char a[DNS_LABEL_MAX], b[DNS_LABEL_MAX], c[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1234:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        const char *a_labels[DNS_N_LABELS_MAX+1], *b_labels[DNS_N_LABELS_MAX+1];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1252:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char la[DNS_LABEL_MAX], lb[DNS_LABEL_MAX];
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1332:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char label[DNS_LABEL_MAX];
data/network-manager-1.27.91/src/NetworkManagerUtils.c:254:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char uuid[37];
data/network-manager-1.27.91/src/NetworkManagerUtils.c:1398:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/NetworkManagerUtils.c:1527:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:342:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bzobj->_object_path_intern, object_path, l);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        sbuf_cap[100];
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:577:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                   _buf[500];                    \
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:768:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cdata_hd->bdaddr_data, bdaddr, l);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:912:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                    sbuf_cap[100];
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:1320:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          uuid[37];
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:2397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sbuf_cap[100];
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:2597:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   sbuf_cap[100];
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:2680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          sbuf_cap[100];
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:174:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(context->rfcomm_tty_path, O_RDONLY | O_NOCTTY | O_CLOEXEC);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:225:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&req.src, &context->src, ETH_ALEN);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:226:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&req.dst, &context->dst, ETH_ALEN);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:337:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&sa.rc_bdaddr, &context->src, ETH_ALEN);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:353:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&sa.rc_bdaddr, &context->dst, ETH_ALEN);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:723:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&context->src_str[0], adapter, src_l);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:725:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) context->dst_str, remote, dst_l);
data/network-manager-1.27.91/src/devices/bluetooth/nm-device-bt.c:825:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               sbuf[100];
data/network-manager-1.27.91/src/devices/bluetooth/nm-device-bt.c:934:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                          sbuf[100];
data/network-manager-1.27.91/src/devices/nm-acd-manager.c:54:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char _sbuf[64];                                                        \
data/network-manager-1.27.91/src/devices/nm-acd-manager.c:91:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *
data/network-manager-1.27.91/src/devices/nm-acd-manager.c:92:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_acd_event_to_string_buf(unsigned event, char buffer[static ACD_EVENT_TO_STRING_BUF_SIZE])
data/network-manager-1.27.91/src/devices/nm-acd-manager.c:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          address_str[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-acd-manager.c:187:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          to_string_buffer[ACD_EVENT_TO_STRING_BUF_SIZE];
data/network-manager-1.27.91/src/devices/nm-acd-manager.c:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-acd-manager.c:416:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-acd-manager.c:478:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(self->hwaddr, hwaddr, ETH_ALEN);
data/network-manager-1.27.91/src/devices/nm-device-bond.c:246:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char sbuf[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device-bridge.c:442:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        value_buf[100];
data/network-manager-1.27.91/src/devices/nm-device-bridge.c:788:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[32];
data/network-manager-1.27.91/src/devices/nm-device-ethernet.c:1642:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            g_hash_table_add(existing_ids, (char *) nm_settings_connection_get_id(connections[i]));
data/network-manager-1.27.91/src/devices/nm-device-factory.c:275:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        list = g_hash_table_lookup(factories_by_setting, (char *) setting_types[i]);
data/network-manager-1.27.91/src/devices/nm-device-factory.c:281:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            g_hash_table_insert(factories_by_setting, (char *) setting_types[i], list);
data/network-manager-1.27.91/src/devices/nm-device-factory.h:179:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static const char *const _setting_types_null[1] = {NULL};              \
data/network-manager-1.27.91/src/devices/nm-device-infiniband.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 ifname_verified[IFNAMSIZ];
data/network-manager-1.27.91/src/devices/nm-device-tun.c:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                s_buf[100];
data/network-manager-1.27.91/src/devices/nm-device-vxlan.c:402:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                      sbuf1[100];
data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:685:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  s_sockaddr[100];
data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:686:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  s_retry[100];
data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:740:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&sockaddr.in.sin_addr, g_inet_address_to_bytes(a), sizeof(struct in_addr));
data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:752:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&sockaddr.in6.sin6_addr,
data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:879:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                                  sockaddr_sbuf[100];
data/network-manager-1.27.91/src/devices/nm-device.c:1780:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&client_id_buf[1], digest, 15);
data/network-manager-1.27.91/src/devices/nm-device.c:2656:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  buf[32];
data/network-manager-1.27.91/src/devices/nm-device.c:3014:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ifname_buf[IFNAMSIZ];
data/network-manager-1.27.91/src/devices/nm-device.c:6847:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             buf1[128], buf2[128];
data/network-manager-1.27.91/src/devices/nm-device.c:7073:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/devices/nm-device.c:7100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          uuid[37];
data/network-manager-1.27.91/src/devices/nm-device.c:7171:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device.c:8468:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device.c:9911:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device.c:10044:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device.c:10318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     sbuf[64], sbuf1[64], sbuf2[64];
data/network-manager-1.27.91/src/devices/nm-device.c:10881:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                (char *) ip6_properties_to_save[i],
data/network-manager-1.27.91/src/devices/nm-device.c:11601:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        str_addr[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device.c:11602:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        str_mask[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device.c:12265:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            if (!g_hash_table_add(check_dups, (char *) whitelist[i]))
data/network-manager-1.27.91/src/devices/nm-device.c:13921:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/nm-device.c:14554:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  buf2[512];
data/network-manager-1.27.91/src/devices/nm-device.c:14759:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             str1[512];
data/network-manager-1.27.91/src/devices/nm-device.c:14760:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             str2[512];
data/network-manager-1.27.91/src/devices/nm-device.c:15939:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char sbuf[64];
data/network-manager-1.27.91/src/devices/nm-device.c:16781:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             buf[NM_UTILS_HWADDR_LEN_MAX];
data/network-manager-1.27.91/src/devices/nm-device.c:16819:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s_buf[NM_UTILS_HWADDR_LEN_MAX_STR];
data/network-manager-1.27.91/src/devices/nm-lldp-listener.c:80:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char _sbuf[64];                                                                     \
data/network-manager-1.27.91/src/devices/nm-lldp-listener.c:364:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&a, &data[1], sizeof(a.addr4));
data/network-manager-1.27.91/src/devices/nm-lldp-listener.c:367:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&a, &data[1], sizeof(a.addr6));
data/network-manager-1.27.91/src/devices/ovs/nm-ovsdb.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               buf[4096]; /* Input buffer */
data/network-manager-1.27.91/src/devices/tests/test-acd.c:158:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char     sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/devices/tests/test-lldp.c:790:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open("/dev/net/tun", O_RDWR | O_CLOEXEC);
data/network-manager-1.27.91/src/devices/tests/test-lldp.c:832:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(fixture->mac, link->l_address.data, ETH_ALEN);
data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.c:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.c:274:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bss_info.bssid, bssid, sizeof(bssid));
data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi-p2p.c:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c:401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c:1865:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char      str_buf[100];
data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c:2120:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char psk[64];
data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c:2124:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(psk, array, psk_len);
data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:25:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 buf[0];
data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:66:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char __prefix[32];                                             \
data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         path[50];
data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:302:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(id->buf, name, strsize);
data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:385:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          uuid[37];
data/network-manager-1.27.91/src/devices/wifi/nm-wifi-ap.c:502:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   str_buf_ts[100];
data/network-manager-1.27.91/src/devices/wwan/nm-modem-broadband.c:121:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                    __prefix_name[128];                          \
data/network-manager-1.27.91/src/devices/wwan/nm-modem-ofono.c:77:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                __prefix_name[128];                         \
data/network-manager-1.27.91/src/devices/wwan/nm-modem.c:124:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pp[_NMLOG_PREFIX_BUFLEN - 5];
data/network-manager-1.27.91/src/devices/wwan/nm-modem.c:137:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char _prefix[_NMLOG_PREFIX_BUFLEN];                                       \
data/network-manager-1.27.91/src/devices/wwan/nm-modem.c:618:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(port, O_RDWR | O_NONBLOCK | O_NOCTTY | O_CLOEXEC);
data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.c:30:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                             buffer[4096];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:273:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf + 1, client_id, len);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:336:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *state_table[NM_DHCP_STATE_MAX + 1] = {
data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:468:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            _LOGI("option %-20s => '%s'", keys[i], (char *) g_hash_table_lookup(options, keys[i]));
data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:652:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          proc_path[NM_STRLEN("/proc/%lu/cmdline") + 100];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:80:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            ((char *) ss)[l - 1] = '\0';
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:85:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            ((char *) ss)[l - 1] = '\0';
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:325:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                          intf[IFNAMSIZ];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:636:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((char *) p)[strlen(p) - 2] = '\0';
data/network-manager-1.27.91/src/dhcp/nm-dhcp-listener.c:82:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                  _prefix[64];                                         \
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:118:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, *datap, n_out);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:529:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          dest_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:530:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          gateway_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:723:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1006:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1066:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   addr_str[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1425:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buffer + 3, hostname, fqdn_len);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:86:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                           addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:275:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char           network_net_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:276:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char           gateway_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  addr_str[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:777:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                           addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:125:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        const char *  addr[4]  = {"0", "0", "0", "0"};
data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:184:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char b1[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:185:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char b2[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:405:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                         sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:758:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(c + 1, client_id, len);
data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-dhclient.c:489:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   buf[NM_STRLEN(EACID) + 1] = {0};
data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-dhclient.c:491:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf + 1, EACID, NM_STRLEN(EACID));
data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:717:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            g_assert_cmpint(((const char *) p)[0], ==, 0);        \
data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  proc_path[256];
data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:422:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sbuf[100];
data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:485:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *          argv[15];
data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:748:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf2[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:812:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          ip_addr_to_string_buf[IP_ADDR_TO_STRING_BUFLEN];
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:140:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                      __prefix[20];                  \
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buf[NM_UTILS_INET_ADDRSTRLEN + 50];
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *        argv[5];
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:914:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen(MY_RESOLV_CONF_TMP, "we")) == NULL) {
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:1123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:1815:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(priv->prev_hash, priv->hash, sizeof(priv->hash));
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:1940:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(_PATH_RESCONF, O_RDONLY | O_CLOEXEC);
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:2282:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char              buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dns/nm-dns-plugin.c:41:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                     __prefix[20];                            \
data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          first[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          last[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          listen_address_s[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          tmpaddr[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        proc_path[250];
data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c:21:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  _first[INET_ADDRSTRLEN];                                                        \
data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c:22:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  _last[INET_ADDRSTRLEN];                                                         \
data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  _first[INET_ADDRSTRLEN];                                                      \
data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c:44:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  _last[INET_ADDRSTRLEN];                                                       \
data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c:397:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *                   dns[2]           = {
data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c:851:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *    subchannels[4] = {0, 0, 0, 0};
data/network-manager-1.27.91/src/initrd/tests/test-cmdline-reader.c:1061:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ifname[16];
data/network-manager-1.27.91/src/initrd/tests/test-cmdline-reader.c:1689:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                vci_arg_long[512] = {0};
data/network-manager-1.27.91/src/main-utils.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     pid[16];
data/network-manager-1.27.91/src/main-utils.c:85:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(pidfile, O_CREAT | O_WRONLY | O_TRUNC | O_CLOEXEC, 00644)) < 0) {
data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              search_list[0];
data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c:463:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(search_list, dns_domain->domain, domain_len);
data/network-manager-1.27.91/src/ndisc/nm-ndisc-private.h:46:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char           __prefix[64];                                              \
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1132:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 changedstr[CONFIG_MAP_MAX_STR];
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 addrstr[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 str_pref[35];
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1194:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 str_exp[100];
data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1233:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/ndisc/tests/test-ndisc-fake.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  buf[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/ndisc/tests/test-ndisc-fake.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                    buf[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-act-request.c:293:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *             envp[1] = {NULL};
data/network-manager-1.27.91/src/nm-active-connection.c:122:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                       _sbuf[64];                                                      \
data/network-manager-1.27.91/src/nm-active-connection.c:364:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf1[_NM_ACTIVATION_STATE_FLAG_TO_STRING_BUFSIZE];
data/network-manager-1.27.91/src/nm-active-connection.c:365:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf2[_NM_ACTIVATION_STATE_FLAG_TO_STRING_BUFSIZE];
data/network-manager-1.27.91/src/nm-auth-manager.c:72:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char __prefix[30] = _NMLOG_PREFIX_NAME;              \
data/network-manager-1.27.91/src/nm-auth-manager.c:96:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                 __prefix[30] = _NMLOG_PREFIX_NAME;                         \
data/network-manager-1.27.91/src/nm-auth-manager.c:311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          subject_buf[64];
data/network-manager-1.27.91/src/nm-checkpoint.c:77:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char __prefix[32];                                             \
data/network-manager-1.27.91/src/nm-config-data.c:746:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(groups_full->pdata, groups, sizeof(groups[0]) * ngroups);
data/network-manager-1.27.91/src/nm-config.c:453:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(no_auto_default_new, no_auto_default_current, sizeof(const char *) * idx);
data/network-manager-1.27.91/src/nm-config.c:456:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&no_auto_default_new[idx + 1],
data/network-manager-1.27.91/src/nm-config.c:2452:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, connection_uuid, connection_uuid_len);
data/network-manager-1.27.91/src/nm-config.c:2457:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, perm_hw_addr_fake, perm_hw_addr_fake_len);
data/network-manager-1.27.91/src/nm-config.c:2478:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[NM_STRLEN(NM_CONFIG_DEVICE_STATE_DIR "/") + DEVICE_STATE_FILENAME_LEN_MAX + 1];
data/network-manager-1.27.91/src/nm-config.c:2572:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    path[NM_STRLEN(NM_CONFIG_DEVICE_STATE_DIR "/") + DEVICE_STATE_FILENAME_LEN_MAX + 1];
data/network-manager-1.27.91/src/nm-config.c:2662:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[NM_STRLEN(NM_CONFIG_DEVICE_STATE_DIR "/") + DEVICE_STATE_FILENAME_LEN_MAX + 1] =
data/network-manager-1.27.91/src/nm-config.c:2688:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf_p, fn, fn_len + 1u);
data/network-manager-1.27.91/src/nm-config.c:2690:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char bb[30];
data/network-manager-1.27.91/src/nm-connectivity.c:741:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                       str_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-core-utils.c:409:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char log_name[1]; /* variable-length object, must be last element!! */
data/network-manager-1.27.91/src/nm-core-utils.c:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                buf_exit[KC_EXIT_TO_STRING_BUF_SIZE], buf_wait[KC_WAITED_TO_STRING];
data/network-manager-1.27.91/src/nm-core-utils.c:540:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf_exit[KC_EXIT_TO_STRING_BUF_SIZE];
data/network-manager-1.27.91/src/nm-core-utils.c:605:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                buf_exit[KC_EXIT_TO_STRING_BUF_SIZE];
data/network-manager-1.27.91/src/nm-core-utils.c:742:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buf_exit[KC_EXIT_TO_STRING_BUF_SIZE];
data/network-manager-1.27.91/src/nm-core-utils.c:743:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buf_wait[KC_WAITED_TO_STRING];
data/network-manager-1.27.91/src/nm-core-utils.c:977:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buf_wait[KC_WAITED_TO_STRING];
data/network-manager-1.27.91/src/nm-core-utils.c:1294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      buf[30 + 1];
data/network-manager-1.27.91/src/nm-core-utils.c:2083:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ifname, parent_iface, parent_len);
data/network-manager-1.27.91/src/nm-core-utils.c:2615:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        buf[IFNAMSIZ];
data/network-manager-1.27.91/src/nm-core-utils.c:2624:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, path, l);
data/network-manager-1.27.91/src/nm-core-utils.c:2687:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[37];
data/network-manager-1.27.91/src/nm-core-utils.c:2903:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                             slen[100];
data/network-manager-1.27.91/src/nm-core-utils.c:3009:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_content, SECRET_KEY_V2_PREFIX, NM_STRLEN(SECRET_KEY_V2_PREFIX));
data/network-manager-1.27.91/src/nm-core-utils.c:3368:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_iid->id_u8, hwaddr + INFINIBAND_ALEN - 8, 8);
data/network-manager-1.27.91/src/nm-core-utils.c:3379:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_iid->id_u8 + 4, &addr, 4);
data/network-manager-1.27.91/src/nm-core-utils.c:3428:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addr->s6_addr + 8, &iid.id_u8, 8);
data/network-manager-1.27.91/src/nm-core-utils.c:3443:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iid, addr->s6_addr + 8, 8);
data/network-manager-1.27.91/src/nm-core-utils.c:3483:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *
data/network-manager-1.27.91/src/nm-core-utils.c:3485:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                             char               buf[static INET6_ADDRSTRLEN])
data/network-manager-1.27.91/src/nm-core-utils.c:3501:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[15];
data/network-manager-1.27.91/src/nm-core-utils.c:3755:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addr->s6_addr + 8, &digest[0], 8);
data/network-manager-1.27.91/src/nm-core-utils.c:3921:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&bin_addr, digest, ETH_ALEN);
data/network-manager-1.27.91/src/nm-core-utils.c:3980:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&client_id_buf[1], hwaddr, hwaddr_len);
data/network-manager-1.27.91/src/nm-core-utils.c:4120:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&arr[0], &duid_type, 2);
data/network-manager-1.27.91/src/nm-core-utils.c:4121:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&arr[2], &hw_type, 2);
data/network-manager-1.27.91/src/nm-core-utils.c:4122:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&arr[4], &duid_time, 4);
data/network-manager-1.27.91/src/nm-core-utils.c:4123:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&arr[8], hwaddr, hwaddr_len);
data/network-manager-1.27.91/src/nm-core-utils.c:4140:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&arr[0], &duid_type, 2);
data/network-manager-1.27.91/src/nm-core-utils.c:4141:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&arr[2], &hw_type, 2);
data/network-manager-1.27.91/src/nm-core-utils.c:4142:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&arr[4], hwaddr, hwaddr_len);
data/network-manager-1.27.91/src/nm-core-utils.c:4164:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&duid_buffer[0], &duid_type, 2);
data/network-manager-1.27.91/src/nm-core-utils.c:4165:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&duid_buffer[2], uuid, 16);
data/network-manager-1.27.91/src/nm-core-utils.c:4460:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&addr, ip, sizeof(struct in6_addr));
data/network-manager-1.27.91/src/nm-core-utils.h:380:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *nm_utils_inet6_interface_identifier_to_token(NMUtilsIPv6IfaceId iid,
data/network-manager-1.27.91/src/nm-core-utils.h:381:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                                         char buf[static INET6_ADDRSTRLEN]);
data/network-manager-1.27.91/src/nm-dbus-manager.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   sender[0];
data/network-manager-1.27.91/src/nm-dbus-manager.c:556:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(caller_info->sender, sender, l);
data/network-manager-1.27.91/src/nm-dcb.c:144:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[10];
data/network-manager-1.27.91/src/nm-dispatcher.c:113:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(extra_strings, log_ifname, l_log_ifname);
data/network-manager-1.27.91/src/nm-dispatcher.c:120:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(extra_strings, log_con_uuid, l_log_con_uuid);
data/network-manager-1.27.91/src/nm-firewall-manager.c:114:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                     _prefix_name[30];                              \
data/network-manager-1.27.91/src/nm-firewall-manager.c:115:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                     _prefix_info[100];                             \
data/network-manager-1.27.91/src/nm-ip4-config.c:915:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-ip4-config.c:1956:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-ip4-config.c:2961:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                addr_str[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-ip6-config.c:669:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-l3-config-data.c:174:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst->data, src->data, src->len * elt_size);
data/network-manager-1.27.91/src/nm-l3-config-data.c:335:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  sbuf[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/nm-l3-config-data.c:336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  sbuf_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-l3cfg.c:240:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char _sbuf_acd[NM_UTILS_INET_ADDRSTRLEN];               \
data/network-manager-1.27.91/src/nm-l3cfg.c:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  sbuf_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-l3cfg.c:343:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sbuf[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/nm-l3cfg.c:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             sbuf[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/nm-l3cfg.c:518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sbuf[1000];
data/network-manager-1.27.91/src/nm-l3cfg.c:1061:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char          sbuf_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-l3cfg.c:2805:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char             sbuf[1024];
data/network-manager-1.27.91/src/nm-l3cfg.c:2890:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                         sbuf_commit_type[50];
data/network-manager-1.27.91/src/nm-l3cfg.c:3012:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     sbuf_ct[30];
data/network-manager-1.27.91/src/nm-logging.c:191:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *_domains_to_string(gboolean          include_level_override,
data/network-manager-1.27.91/src/nm-logging.c:455:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *
data/network-manager-1.27.91/src/nm-logging.c:501:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _all_logging_domains_to_str[273];
data/network-manager-1.27.91/src/nm-logging.c:722:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *         iov_free_data[5];
data/network-manager-1.27.91/src/nm-logging.c:726:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  s_log_domains_buf[NM_STRLEN("NM_LOG_DOMAINS=") + sizeof(_all_logging_domains_to_str)];
data/network-manager-1.27.91/src/nm-logging.c:818:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char      s[255];
data/network-manager-1.27.91/src/nm-manager.c:243:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                   _sbuf[32];                                                      \
data/network-manager-1.27.91/src/nm-manager.c:268:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                   _sbuf[32];                                                      \
data/network-manager-1.27.91/src/nm-manager.c:295:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                   _sbuf[32];                                                      \
data/network-manager-1.27.91/src/nm-manager.c:1163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                s_buf[60];
data/network-manager-1.27.91/src/nm-manager.c:2816:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    src_fd = open(src, O_RDONLY | O_CLOEXEC);
data/network-manager-1.27.91/src/nm-manager.c:2820:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dst_fd = open(dst, O_CREAT | O_EXCL | O_CLOEXEC | O_WRONLY, 0644);
data/network-manager-1.27.91/src/nm-manager.c:7537:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open("/dev/rfkill", O_RDWR | O_CLOEXEC);
data/network-manager-1.27.91/src/nm-netns.c:243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   sbuf_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-netns.c:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            sbuf_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-pacrunner-manager.c:132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-policy.c:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-policy.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-policy.c:329:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/nm-test-utils-core.h:244:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/nm-test-utils-core.h:313:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nm-fake-platform.c:65:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char              __prefix[32];                                                   \
data/network-manager-1.27.91/src/platform/nm-fake-platform.c:270:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(link->l_address.data, address, address_len);
data/network-manager-1.27.91/src/platform/nm-fake-platform.c:617:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(obj_tmp->link.l_address.data, addr, len);
data/network-manager-1.27.91/src/platform/nm-fake-platform.c:790:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                             name[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-fake-platform.c:1207:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:480:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char              __prefix[32];                                                   \
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:1127:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char              ifname_verified[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:1202:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(RTA_DATA(rta), data, alen);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:2886:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dst->data, nla_data(nla), l);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3272:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&obj->ip4_address.address, nla_data(tb[IFA_LOCAL]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3274:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&obj->ip4_address.peer_address, nla_data(tb[IFA_ADDRESS]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3290:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&obj->ip6_address.address, nla_data(tb[IFA_LOCAL]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3292:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&obj->ip6_address.peer_address, nla_data(tb[IFA_ADDRESS]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3296:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&obj->ip6_address.address, nla_data(tb[IFA_ADDRESS]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3306:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char label[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3435:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&nh.gateway, nla_data(ntb[RTA_GATEWAY]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3454:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&gateway, nla_data(tb[RTA_GATEWAY]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3516:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(obj->ip_route.network_ptr, nla_data(tb[RTA_DST]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3533:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&obj->ip4_route.pref_src, nla_data(tb[RTA_PREFSRC]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3535:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&obj->ip6_route.pref_src, nla_data(tb[RTA_PREFSRC]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3543:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&obj->ip6_route.src, nla_data(tb[RTA_SRC]), addr_len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5163:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(path, O_WRONLY | O_TRUNC | O_CLOEXEC);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5213:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(actual, value, len - 1);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5524:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(entry->path_data, pathid, len + 1);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5781:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char   b[255];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5810:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char _buf[255];                                                                   \
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:6215:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            str_buf[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:6216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            str_buf2[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:6854:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                      buf_nlmsghdr[400];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7065:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                    s_buf[256];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                    s_buf[256];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                    s_buf[256];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        s_buf[256];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                         s_flags[100];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7492:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                         sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7544:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7660:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7662:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *          values[3];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7663:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  buf[64];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7807:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivm.mac, vf->mac.data, vf->mac.len);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7922:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              ifname_verified[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7934:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              ifname_verified[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7962:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open("/dev/net/tun", O_RDWR | O_CLOEXEC);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8058:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&map[current_n_map], set_map, sizeof(*set_map) * set_n_map);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              ifname_parent[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              id[20];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              name[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8718:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char            buf[64];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8786:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                         s_buf[256];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8827:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                         s_buf[256];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8871:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                         s_buf[256];
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8965:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                         buf_nlmsghdr[400];
data/network-manager-1.27.91/src/platform/nm-netlink.c:339:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nm->nm_nlh, hdr, hdr->nlmsg_len);
data/network-manager-1.27.91/src/platform/nm-netlink.c:382:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, data, len);
data/network-manager-1.27.91/src/platform/nm-netlink.c:451:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dst, src, len);
data/network-manager-1.27.91/src/platform/nm-netlink.c:483:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, nla_data(nla), len);
data/network-manager-1.27.91/src/platform/nm-netlink.c:503:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(nla_data(nla), data, datalen);
data/network-manager-1.27.91/src/platform/nm-netlink.c:683:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&msg->nm_src, addr, sizeof(*addr));
data/network-manager-1.27.91/src/platform/nm-netlink.c:698:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&msg->nm_creds, creds, sizeof(*creds));
data/network-manager-1.27.91/src/platform/nm-netlink.c:726:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nlmsg_data(nlh), &hdr, sizeof(hdr));
data/network-manager-1.27.91/src/platform/nm-netlink.c:1332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[CMSG_SPACE(sizeof(struct ucred))];
data/network-manager-1.27.91/src/platform/nm-netlink.c:1353:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(CMSG_DATA(cmsg), creds, sizeof(struct ucred));
data/network-manager-1.27.91/src/platform/nm-netlink.h:137:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    return &(((char *) nla)[NLA_HDRLEN]);
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char      ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              known_ifnames[2][IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:241:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(edata, edata_backup, edata_size);
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sbuf[50];
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:327:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sbuf[50];
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:731:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                         sbuf[255];
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, pdata, edata.e.size);
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1729:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ifname_buf_last_try[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1730:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        ifname_buf[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1732:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        sysdir[NM_STRLEN(SYS_CLASS_NET) + IFNAMSIZ] = SYS_CLASS_NET;
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1733:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        fd_buf[256];
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1762:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd_dir = open(sysdir, O_DIRECTORY | O_CLOEXEC);
data/network-manager-1.27.91/src/platform/nm-platform-utils.h:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    driver[32];
data/network-manager-1.27.91/src/platform/nm-platform-utils.h:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    version[32];
data/network-manager-1.27.91/src/platform/nm-platform-utils.h:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    fw_version[32];
data/network-manager-1.27.91/src/platform/nm-platform-utils.h:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    _private_bus_info[32];
data/network-manager-1.27.91/src/platform/nm-platform-utils.h:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    _private_erom_version[32];
data/network-manager-1.27.91/src/platform/nm-platform-utils.h:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    _private_reserved2[12];
data/network-manager-1.27.91/src/platform/nm-platform.c:62:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *
data/network-manager-1.27.91/src/platform/nm-platform.c:64:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char                  buf[static(NM_UTILS_HWADDR_LEN_MAX * 3)])
data/network-manager-1.27.91/src/platform/nm-platform.c:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                    __prefix[32];                                             \
data/network-manager-1.27.91/src/platform/nm-platform.c:603:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:629:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char svalue[20];
data/network-manager-1.27.91/src/platform/nm-platform.c:631:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(svalue, "%d", value);
data/network-manager-1.27.91/src/platform/nm-platform.c:643:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  path[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:644:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str[128];
data/network-manager-1.27.91/src/platform/nm-platform.c:672:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:673:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[128];
data/network-manager-1.27.91/src/platform/nm-platform.c:807:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:825:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:844:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:860:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:861:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[64];
data/network-manager-1.27.91/src/platform/nm-platform.c:1237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addr_buf[NM_UTILS_HWADDR_LEN_MAX * 3];
data/network-manager-1.27.91/src/platform/nm-platform.c:1238:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parent_buf[64];
data/network-manager-1.27.91/src/platform/nm-platform.c:1239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/network-manager-1.27.91/src/platform/nm-platform.c:1404:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *
data/network-manager-1.27.91/src/platform/nm-platform.c:1405:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
nm_platform_if_indextoname(NMPlatform *self, int ifindex, char out_ifname[static 16 /* IFNAMSIZ */])
data/network-manager-1.27.91/src/platform/nm-platform.c:2414:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf_lnk[256];
data/network-manager-1.27.91/src/platform/nm-platform.c:2415:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf_peers[512];
data/network-manager-1.27.91/src/platform/nm-platform.c:2416:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf_change_flags[100];
data/network-manager-1.27.91/src/platform/nm-platform.c:2490:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[255];
data/network-manager-1.27.91/src/platform/nm-platform.c:2558:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              ifname_verified[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform.c:2579:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              ifname_verified[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform.c:2700:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  buf[512];
data/network-manager-1.27.91/src/platform/nm-platform.c:2777:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  name[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform.c:2840:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                           ifname_verified[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform.c:2958:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform.c:3256:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buf, " dev ");
data/network-manager-1.27.91/src/platform/nm-platform.c:3287:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, S_FLAGS_PREFIX, NM_STRLEN(S_FLAGS_PREFIX));
data/network-manager-1.27.91/src/platform/nm-platform.c:3631:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_dev[TO_STRING_DEV_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:3632:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:3633:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b2[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:3634:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_peer[INET_ADDRSTRLEN + 50];
data/network-manager-1.27.91/src/platform/nm-platform.c:3654:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_dev[TO_STRING_DEV_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:3655:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:4451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                           sbuf1[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nm-platform.c:4452:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                           sbuf2[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nm-platform.c:4801:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sbuf[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nm-platform.c:4890:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                      buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:4891:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                      buf_oif[64];
data/network-manager-1.27.91/src/platform/nm-platform.c:5474:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        master[20];
data/network-manager-1.27.91/src/platform/nm-platform.c:5475:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        parent[20];
data/network-manager-1.27.91/src/platform/nm-platform.c:5476:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_flags[1 + NM_PLATFORM_LINK_FLAGS2STR_MAX_LEN + 1];
data/network-manager-1.27.91/src/platform/nm-platform.c:5477:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_highlighted_flags[50];
data/network-manager-1.27.91/src/platform/nm-platform.c:5480:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_addrmode[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5481:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_address[NM_UTILS_HWADDR_LEN_MAX * 3];
data/network-manager-1.27.91/src/platform/nm-platform.c:5482:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_broadcast[NM_UTILS_HWADDR_LEN_MAX * 3];
data/network-manager-1.27.91/src/platform/nm-platform.c:5483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_inet6_token[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5664:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_local[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5665:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_local1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5666:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_remote[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5667:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_remote1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5668:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_ttl[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5669:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_tos[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5670:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_parent_ifindex[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5671:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_input_flags[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5672:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_output_flags[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5673:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_input_key[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_input_key1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5675:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_output_key[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5676:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_output_key1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5729:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_p_key[64];
data/network-manager-1.27.91/src/platform/nm-platform.c:5749:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_local[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5750:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_local1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5751:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_remote[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5752:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_remote1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5753:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_ttl[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5754:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_tclass[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5755:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_flow[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5756:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_encap[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5757:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_proto[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5758:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_parent_ifindex[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5801:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_local[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5802:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_local1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5803:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_remote[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5804:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_remote1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5805:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_ttl[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5806:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_tos[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5807:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_parent_ifindex[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5891:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_local[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5892:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_local1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5893:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_remote[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_remote1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:5895:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_ttl[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5896:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_tos[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5897:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_flags[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5898:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_proto[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5899:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_parent_ifindex[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:5938:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_owner[50];
data/network-manager-1.27.91/src/platform/nm-platform.c:5939:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_group[50];
data/network-manager-1.27.91/src/platform/nm-platform.c:5940:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_type[50];
data/network-manager-1.27.91/src/platform/nm-platform.c:6006:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_group[100];
data/network-manager-1.27.91/src/platform/nm-platform.c:6007:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_group6[100];
data/network-manager-1.27.91/src/platform/nm-platform.c:6008:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_local[100];
data/network-manager-1.27.91/src/platform/nm-platform.c:6009:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_local6[100];
data/network-manager-1.27.91/src/platform/nm-platform.c:6010:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_dev[25];
data/network-manager-1.27.91/src/platform/nm-platform.c:6011:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_limit[25];
data/network-manager-1.27.91/src/platform/nm-platform.c:6012:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_src_port[35];
data/network-manager-1.27.91/src/platform/nm-platform.c:6013:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_dst_port[25];
data/network-manager-1.27.91/src/platform/nm-platform.c:6014:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_tos[25];
data/network-manager-1.27.91/src/platform/nm-platform.c:6015:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_ttl[25];
data/network-manager-1.27.91/src/platform/nm-platform.c:6016:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6106:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          s_sockaddr[NM_UTILS_INET_ADDRSTRLEN + 100];
data/network-manager-1.27.91/src/platform/nm-platform.c:6107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          s_endpoint[20 + sizeof(s_sockaddr)];
data/network-manager-1.27.91/src/platform/nm-platform.c:6108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          s_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          s_keepalive[100];
data/network-manager-1.27.91/src/platform/nm-platform.c:6203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        s_flags[TO_STRING_IFA_FLAGS_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:6204:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        s_address[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6205:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        s_peer[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6206:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_dev[TO_STRING_DEV_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:6207:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_label[32];
data/network-manager-1.27.91/src/platform/nm-platform.c:6208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_lft[30], str_pref[30], str_time[50], s_source[50];
data/network-manager-1.27.91/src/platform/nm-platform.c:6213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_broadcast[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6351:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        s_flags[TO_STRING_IFA_FLAGS_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:6352:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        s_address[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6353:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        s_peer[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_lft[30], str_pref[30], str_time[50], s_source[50];
data/network-manager-1.27.91/src/platform/nm-platform.c:6355:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_dev[TO_STRING_DEV_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:6460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_network[INET_ADDRSTRLEN], s_gateway[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_pref_src[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6462:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_dev[TO_STRING_DEV_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:6463:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_table[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:6464:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_scope[30], s_source[50];
data/network-manager-1.27.91/src/platform/nm-platform.c:6465:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_tos[32], str_window[32], str_cwnd[32], str_initcwnd[32], str_initrwnd[32], str_mtu[32];
data/network-manager-1.27.91/src/platform/nm-platform.c:6466:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_rtm_flags[_RTM_FLAGS_TO_STRING_MAXLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6467:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_type[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:6468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_metric[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:6570:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_network[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6571:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_gateway[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6572:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_pref_src[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_src_all[INET6_ADDRSTRLEN + 40];
data/network-manager-1.27.91/src/platform/nm-platform.c:6574:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_src[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6575:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_type[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:6576:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_table[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:6577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_pref[40];
data/network-manager-1.27.91/src/platform/nm-platform.c:6578:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_pref2[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:6579:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_dev[TO_STRING_DEV_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:6580:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_source[50];
data/network-manager-1.27.91/src/platform/nm-platform.c:6581:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_window[32];
data/network-manager-1.27.91/src/platform/nm-platform.c:6582:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_cwnd[32];
data/network-manager-1.27.91/src/platform/nm-platform.c:6583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_initcwnd[32];
data/network-manager-1.27.91/src/platform/nm-platform.c:6584:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_initrwnd[32];
data/network-manager-1.27.91/src/platform/nm-platform.c:6585:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_mtu[32];
data/network-manager-1.27.91/src/platform/nm-platform.c:6586:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_rtm_flags[_RTM_FLAGS_TO_STRING_MAXLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6587:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_metric[30];
data/network-manager-1.27.91/src/platform/nm-platform.c:6692:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     s_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nm-platform.c:6881:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        ss_buf[60];
data/network-manager-1.27.91/src/platform/nm-platform.c:6948:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        str_dev[TO_STRING_DEV_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:7085:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str_dev[TO_STRING_DEV_BUF_SIZE];
data/network-manager-1.27.91/src/platform/nm-platform.c:7086:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  act_buf[300];
data/network-manager-1.27.91/src/platform/nm-platform.c:7187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 str_mac[128], mac[128];
data/network-manager-1.27.91/src/platform/nm-platform.c:7188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 str_spoof_check[64];
data/network-manager-1.27.91/src/platform/nm-platform.c:7189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 str_trust[64];
data/network-manager-1.27.91/src/platform/nm-platform.c:7190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 str_min_tx_rate[64];
data/network-manager-1.27.91/src/platform/nm-platform.c:7191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 str_max_tx_rate[64];
data/network-manager-1.27.91/src/platform/nm-platform.c:7243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_vid_end[64];
data/network-manager-1.27.91/src/platform/nm-platform.h:211:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       name[NMP_IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform.h:371:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[NMP_IFNAMSIZ];
data/network-manager-1.27.91/src/platform/nm-platform.h:629:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               iifname[NMP_IFNAMSIZ];      /* FRA_IIFNAME */
data/network-manager-1.27.91/src/platform/nm-platform.h:630:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               oifname[NMP_IFNAMSIZ];      /* FRA_OIFNAME */
data/network-manager-1.27.91/src/platform/nm-platform.h:712:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sdata[32];
data/network-manager-1.27.91/src/platform/nm-platform.h:1514:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *nm_platform_if_indextoname(NMPlatform *self,
data/network-manager-1.27.91/src/platform/nm-platform.h:1516:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       char        out_ifname[static 16 /* IFNAMSIZ */]);
data/network-manager-1.27.91/src/platform/nmp-netns.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        bb[200];
data/network-manager-1.27.91/src/platform/nmp-netns.c:77:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char      _sbuf[20];                                      \
data/network-manager-1.27.91/src/platform/nmp-netns.c:315:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd_net = open(PROC_SELF_NS_NET, O_RDONLY | O_CLOEXEC);
data/network-manager-1.27.91/src/platform/nmp-netns.c:327:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd_mnt = open(PROC_SELF_NS_MNT, O_RDONLY | O_CLOEXEC);
data/network-manager-1.27.91/src/platform/nmp-netns.c:350:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             buf[100];
data/network-manager-1.27.91/src/platform/nmp-netns.c:456:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char       sbuf[100];
data/network-manager-1.27.91/src/platform/nmp-netns.c:661:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fd = open(filename, O_RDONLY | O_CLOEXEC)) == -1) {
data/network-manager-1.27.91/src/platform/nmp-object.c:170:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, src_len);
data/network-manager-1.27.91/src/platform/nmp-object.c:215:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src, src_len);
data/network-manager-1.27.91/src/platform/nmp-object.c:222:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/nmp-object.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s_scope_id[40];
data/network-manager-1.27.91/src/platform/nmp-object.c:769:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&obj->object, plobj, klass->sizeof_public);
data/network-manager-1.27.91/src/platform/nmp-object.c:826:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&obj->object, plobj, klass->sizeof_public);
data/network-manager-1.27.91/src/platform/nmp-object.c:887:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            buf2[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nmp-object.c:978:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            buf2[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nmp-object.c:1042:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            buf2[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/nmp-object.c:1095:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        _nm_unused char  buf1[NM_UTILS_INET_ADDRSTRLEN];                                  \
data/network-manager-1.27.91/src/platform/nmp-object.c:1096:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        _nm_unused char  buf2[NM_UTILS_INET_ADDRSTRLEN];                                  \
data/network-manager-1.27.91/src/platform/nmp-object.c:1299:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&dst->object, &src->object, klass->sizeof_data);
data/network-manager-1.27.91/src/platform/nmp-object.h:436:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    obj = plobj ? (NMPObject *) (&(((char *) plobj)[-((int) G_STRUCT_OFFSET(NMPObject, object))]))
data/network-manager-1.27.91/src/platform/tests/test-common.c:211:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:235:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char sbuf[sizeof(_nm_utils_to_string_buffer)];
data/network-manager-1.27.91/src/platform/tests/test-common.c:574:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:666:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s_src[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:667:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s_network[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1039:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          b1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1040:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          b2[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1053:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char s_peer[NM_UTILS_INET_ADDRSTRLEN + 50];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1287:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        b1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1288:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        b2[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1432:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_gfw[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1433:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_mhm[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1434:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_mlmc[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1435:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_mlmi[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1436:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_mmi[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1437:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_mqi[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1438:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_mqii[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1439:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_msqc[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1440:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_msqi[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1441:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf_mqri[100];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1629:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b1[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1630:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b2[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1681:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b2[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1682:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  encap[20];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1683:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  tclass[20];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1746:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1747:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b2[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1748:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  tclass[20];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1805:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b1[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1806:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b2[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1897:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b1[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:1898:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  b2[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:2056:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          local[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:2057:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          group[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-common.c:2336:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char read_buf[1];
data/network-manager-1.27.91/src/platform/tests/test-common.c:2445:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char p[1000];
data/network-manager-1.27.91/src/platform/tests/test-common.c:2452:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return open(p, O_RDONLY | O_CLOEXEC);
data/network-manager-1.27.91/src/platform/tests/test-common.c:2495:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("/proc/self/setgroups", "we");
data/network-manager-1.27.91/src/platform/tests/test-common.c:2502:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("/proc/self/uid_map", "we");
data/network-manager-1.27.91/src/platform/tests/test-common.c:2509:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen("/proc/self/gid_map", "we");
data/network-manager-1.27.91/src/platform/tests/test-link.c:574:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  addr[ETH_ALEN];
data/network-manager-1.27.91/src/platform/tests/test-link.c:637:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char  mac[6] = {0x00, 0xff, 0x11, 0xee, 0x22, 0xdd};
data/network-manager-1.27.91/src/platform/tests/test-link.c:809:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, b, dst_len);
data/network-manager-1.27.91/src/platform/tests/test-link.c:1151:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                   s_addr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-link.c:1470:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                  buf[256];
data/network-manager-1.27.91/src/platform/tests/test-link.c:2416:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  name[64];
data/network-manager-1.27.91/src/platform/tests/test-link.c:2773:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        sbuf[100];
data/network-manager-1.27.91/src/platform/tests/test-link.c:3109:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char          path[600];
data/network-manager-1.27.91/src/platform/tests/test-link.c:3205:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *const IFNAME[3] = {
data/network-manager-1.27.91/src/platform/tests/test-link.c:3213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  ifname_buf[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/tests/test-link.c:3309:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              ifname_buf[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/tests/test-platform-general.c:58:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        buf[NM_PLATFORM_LINK_FLAGS2STR_MAX_LEN + 100];
data/network-manager-1.27.91/src/platform/tests/test-platform-general.c:103:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char *const EXPECTED_BUFFER[3] = {
data/network-manager-1.27.91/src/platform/tests/test-route.c:915:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/tests/test-route.c:916:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  ifname2[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/tests/test-route.c:917:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  s1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/tests/test-route.c:1277:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   saddr[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c:29:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        _ifname_buf[IFNAMSIZ];                                             \
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c:447:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(info->bssid, nla_data(bss[NL80211_BSS_BSSID]), ETH_ALEN);
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c:467:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(info->ssid, ssid, ssid_len);
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c:525:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out_bssid, bss_info.bssid, ETH_ALEN);
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:204:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:287:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out_bssid, &(wrq.u.ap_addr.sa_data), ETH_ALEN);
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:434:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:479:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:510:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             buf[IW_ESSID_MAX_SIZE + 1];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:697:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                            ifname[IFNAMSIZ];
data/network-manager-1.27.91/src/platform/wpan/nm-wpan-utils.c:20:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        _ifname_buf[IFNAMSIZ];                                                        \
data/network-manager-1.27.91/src/ppp/nm-ppp-manager.c:607:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out_addr->s6_addr + 8, &iid, sizeof(iid));
data/network-manager-1.27.91/src/ppp/nm-pppd-plugin.c:125:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char                       new_name[IF_NAMESIZE];
data/network-manager-1.27.91/src/ppp/nm-pppd-plugin.c:275:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&iid, &eui, sizeof(eui));
data/network-manager-1.27.91/src/settings/nm-agent-manager.c:71:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char           __prefix1[32];                                    \
data/network-manager-1.27.91/src/settings/nm-agent-manager.c:72:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char           __prefix2[128];                                   \
data/network-manager-1.27.91/src/settings/nm-secret-agent.c:69:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char _prefix[64];                                                    \
data/network-manager-1.27.91/src/settings/nm-secret-agent.c:676:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  buf_subject[64];
data/network-manager-1.27.91/src/settings/nm-secret-agent.c:677:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  buf_caps[150];
data/network-manager-1.27.91/src/settings/nm-settings-connection.c:140:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char        __prefix[128];                                                      \
data/network-manager-1.27.91/src/settings/nm-settings-connection.c:2095:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char     buf1[255], buf2[255];
data/network-manager-1.27.91/src/settings/nm-settings-connection.c:2232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                         sbuf[60];
data/network-manager-1.27.91/src/settings/nm-settings-connection.c:2483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                               buf[100];
data/network-manager-1.27.91/src/settings/nm-settings-utils.c:115:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(sbuh->uuid_data, uuid, l);
data/network-manager-1.27.91/src/settings/nm-settings.c:196:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sett_conn_entry->_uuid_data, uuid, l_p_1);
data/network-manager-1.27.91/src/settings/nm-settings.c:3087:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(list, list_cached, sizeof(list[0]) * ((gsize) len + 1));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char flags_key[250];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                      flags_key[250];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:685:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          tag[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:714:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          tag[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:715:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          prefix_tag[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:722:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          inet_buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1014:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                              buf1[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1015:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                              buf2[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          tag[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1402:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          netmask_tag[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1410:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          inet_buf[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1976:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tag[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2491:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tag[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2623:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               tag[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2747:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              key[255];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:5085:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                ((char *) equals)[0] = '\0';
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:6385:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(p_device, device, i + 1);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:6400:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(p_path, IFUP_PATH_PREFIX, NM_STRLEN(IFUP_PATH_PREFIX));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.h:149:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *const _nm_ethtool_ifcfg_names[_NM_ETHTOOL_ID_NUM];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   secret_name[100];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   secret_flags[sizeof(secret_name) + NM_STRLEN("_FLAGS")];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:653:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tag[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:689:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char          tag[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:904:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[33];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:907:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, ssid_data, ssid_len);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:963:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tag[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1381:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           s_buf[50], *s_buf_ptr;
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1870:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prop[NM_STRLEN("DCB_xxxxxxxxxxxxxxxxxxxxxxx_yyyyyyyyyyyyyyyyyyyy")];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1885:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prop[NM_STRLEN("DCB_xxxxxxxxxxxxxxxxxxxxxxx_yyyyyyyyyyyyyyyyyyyy")];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1904:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str[9];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1925:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  str[9];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2208:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char b[100];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2258:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char lock_name[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2312:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          buf[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2316:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          addr_key[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2317:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          gw_key[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2318:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          netmask_key[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2319:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          metric_key[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2320:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char          options_key[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2466:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            key[32];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char               tag[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2640:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tag[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2658:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                   tag[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2739:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:3133:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char                key[64];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:881:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(name, O_RDWR | O_CLOEXEC); /* NOT O_CREAT */
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:884:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(name, O_RDONLY | O_CLOEXEC); /* NOT O_CREAT */
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:1421:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NM_DECIMAL_STR_MAX(value)];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:1489:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            s->fd = open(s->fileName, O_WRONLY | O_CREAT | O_CLOEXEC, mode);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:116:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char NO_EXPECTED[1];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:612:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33};
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:666:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *               expected_mac_blacklist[3] = {"00:16:41:11:22:88",
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:719:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33};
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:838:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 expected_mac_address[ETH_ALEN] = {0x00, 0x11, 0x22, 0x33, 0x44, 0xee};
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:984:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                 expected_mac_address[ETH_ALEN] = {0x00, 0x11, 0x22, 0x33, 0x44, 0xee};
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2271:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         path[256];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2591:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33};
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2801:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char         expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33};
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33};
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:4015:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                      cexpected[NM_STRLEN(TEST_IFCFG_DIR) + 100];
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:8422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char             expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33};
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:9274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        expected_mac_address[INFINIBAND_ALEN] = {0x80, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55,
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) ifb->name, name, l_name);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:49:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) ifb->type, type, l_type);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:72:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) ifd->key, key, l_key);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:74:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *) ifd->data, data, l_data);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  line[255];
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:118:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    inp = fopen(eni_file, "re");
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:128:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *token[128]; /* 255 chars can only be split into 127 tokens */
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:129:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  value[255]; /* large enough to join previously split tokens */
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:453:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                netmask_int = atoi(netmask_v);
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *dirname_libs[2];
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.c:767:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                               strbuf[100];
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.c:894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  strbuf[100];
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  filename[250];
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected_mac_address[ETH_ALEN] = {0x00, 0x11, 0x22, 0x33, 0x44, 0x55};
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:642:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected_mac_address[ETH_ALEN] = {0x00, 0x11, 0xaa, 0xbb, 0xcc, 0x55};
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:671:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                          expected_mac[ETH_ALEN] = {0x00, 0x11, 0xaa, 0xbb, 0xcc, 0x55};
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:672:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected_cloned_mac[ETH_ALEN]                   = {0x00, 0x16, 0xaa, 0xbb, 0xcc, 0xfe};
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:158:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(opt->value, value, len);
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:165:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[255];
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:167:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&buf[0], opt->value, opt->len > 254 ? 254 : opt->len);
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:330:78:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            g_variant_builder_add(&builder, "{sv}", key, g_variant_new_int32(atoi(option->value)));
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:402:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        buf[32];
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:717:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(digest, md5, 13);
data/network-manager-1.27.91/src/supplicant/nm-supplicant-interface.c:199:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        _sbuf[255];                                                 \
data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.c:464:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ifname[NMP_IFNAMSIZ];
data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.c:506:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                  ifname[NMP_IFNAMSIZ];
data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.c:636:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        ifname[NMP_IFNAMSIZ];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.c:119:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&arp.arp_sha, ha, ETH_ALEN);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.c:120:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&arp.arp_tpa, &pa, sizeof(pa));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.c:123:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&arp.arp_spa, &pa, sizeof(pa));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:84:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(duid->llt.haddr, addr, addr_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:105:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(duid->ll.haddr, addr, addr_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:156:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&duid->raw.data, &machine_id, sizeof(machine_id));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:180:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char ifindex_str[1 + DECIMAL_STR_MAX(int)];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-network.c:111:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(link->ll.sll_addr, bcast_addr, mac_addr_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-network.c:137:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&eth_mac, mac_addr, ETH_ALEN);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c:64:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(&options[*offset + 1], *s, len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c:101:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(&options[*offset + 2], p->data, p->length);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-packet.c:64:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&buf_tail, buf_64, len % sizeof(uint64_t));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:106:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(p + 8, options->data, options->length);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:152:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*buf, (char*) ia + iaid_offset, len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:163:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(*buf, &addr->iaaddr, sizeof(addr->iaaddr));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:225:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&p[offset + 2], *s, len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:265:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&p[offset + 2], *s, len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:289:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&option->data, &pd->ia_pd, sizeof(pd->ia_pd));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:298:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&prefix_opt->iapdprefix, &prefix->iapdprefix, sizeof(struct iapdprefix));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:310:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&prefix_opt->iapdprefix, &hint_pd_prefix->iapdprefix, sizeof(struct iapdprefix));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:512:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&ia->ia_ta.id, iaoption->data, sizeof(ia->ia_ta));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:639:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*addrs + count, optval, optlen);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c:183:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&n->source_address, h.ether_shost, sizeof(struct ether_addr));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c:184:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&n->destination_address, h.ether_dhost, sizeof(struct ether_addr));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c:654:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(LLDP_NEIGHBOR_RAW(n), raw, raw_size);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c:742:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(oui, d, 3);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:74:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v + sizeof(sd_id128_t), name, l);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:156:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *const wifi_iftype_table[NL80211_IFTYPE_MAX+1] = {
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:678:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char sbuf[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:739:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buffer[INET6_ADDRSTRLEN];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:793:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char sbuf[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:323:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&client->mac_addr, addr, addr_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:398:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&client->client_id.raw.data, data, data_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:457:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&client->client_id.ns.duid.raw.data, duid, duid_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:799:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&packet->dhcp.chaddr, &client->mac_addr, ETH_ALEN);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:1628:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char time_string[FORMAT_TIMESPAN_MAX];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:1743:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char time_string[FORMAT_TIMESPAN_MAX];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:2073:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&release->dhcp.chaddr, &client->mac_addr, client->mac_addr_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:2107:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&release->dhcp.chaddr, &client->mac_addr, client->mac_addr_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c:332:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, option, 4);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c:522:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&route->dst_addr.s_addr, option, dst_octets);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c:880:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sbuf[INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c:1016:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char key[STRLEN("OPTION_000")+1];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:97:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * dhcp6_message_type_table[_DHCP6_MESSAGE_MAX] = {
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:115:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * dhcp6_message_status_table[_DHCP6_STATUS_MAX] = {
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:209:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&client->mac_addr, addr, addr_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:286:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&client->duid.raw.data, duid, duid_len);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:947:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char time_string[FORMAT_TIMESPAN_MAX];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:1565:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char time_string[FORMAT_TIMESPAN_MAX];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-lease.c:151:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addr, &lease->addr_iter->iaaddr.address,
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-lease.c:180:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(prefix, &lease->prefix_iter->iapdprefix.address,
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-ipv4acd.c:210:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char ts[FORMAT_TIMESPAN_MAX];
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-lldp.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char * const lldp_event_table[_SD_LLDP_EVENT_MAX] = {
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:1861:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(path, O_PATH|O_CLOEXEC|
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:3685:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char b[ELEMENTSOF(e->delays) * DECIMAL_STR_MAX(unsigned) + 1], *p;
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:17:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *id128_to_uuid_string(sd_id128_t id, char s[static ID128_UUID_STRING_MAX]) {
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:17:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *id128_to_uuid_string(sd_id128_t id, char s[static ID128_UUID_STRING_MAX]) {
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:85:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[36 + 2];
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:138:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(p, O_RDONLY|O_CLOEXEC|O_NOCTTY);
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:147:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[36 + 2];
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:183:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(p, O_WRONLY|O_CREAT|O_CLOEXEC|O_NOCTTY|O_TRUNC, 0444);
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.h:13:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *id128_to_uuid_string(sd_id128_t id, char s[static ID128_UUID_STRING_MAX]);
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.h:13:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *id128_to_uuid_string(sd_id128_t id, char s[static ID128_UUID_STRING_MAX]);
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/sd-id128.c:24:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_public_ char *sd_id128_to_string(sd_id128_t id, char s[_SD_ARRAY_STATIC SD_ID128_STRING_MAX]) {
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/sd-id128.c:24:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
_public_ char *sd_id128_to_string(sd_id128_t id, char s[_SD_ARRAY_STATIC SD_ID128_STRING_MAX]) {
data/network-manager-1.27.91/src/systemd/src/systemd/sd-id128.h:38:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *sd_id128_to_string(sd_id128_t id, char s[_SD_ARRAY_STATIC SD_ID128_STRING_MAX]);
data/network-manager-1.27.91/src/systemd/src/systemd/sd-id128.h:38:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *sd_id128_to_string(sd_id128_t id, char s[_SD_ARRAY_STATIC SD_ID128_STRING_MAX]);
data/network-manager-1.27.91/src/tests/test-core.c:41:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, src, nbytes);
data/network-manager-1.27.91/src/tests/test-core.c:322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        path[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE];
data/network-manager-1.27.91/src/tests/test-core.c:1674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[NM_STRLEN(BUF_ORIG) + 1];
data/network-manager-1.27.91/src/tests/test-core.c:1675:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[NM_STRLEN(BUF_ORIG) + 1];
data/network-manager-1.27.91/src/tests/test-core.c:2265:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          machine_id_str[33];
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:213:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char __prefix[__NMLOG_prefix_buf_len];                                           \
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:1005:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        b1[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:1006:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        b2[NM_UTILS_INET_ADDRSTRLEN];
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:1299:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(addr, bytes, len);
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:2260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *                  vpn_argv[4];
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:2265:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                    env_log_level[NM_STRLEN("NM_VPN_LOG_LEVEL=") + 100];
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:2266:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                    env_log_syslog[NM_STRLEN("NM_VPN_LOG_SYSLOG=") + 10];
data/network-manager-1.27.91/clients/cli/common.c:968:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int         subst_len        = strlen(subst);
data/network-manager-1.27.91/clients/cli/common.c:1048:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len      = strlen(text);
data/network-manager-1.27.91/clients/cli/connections.c:3665:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        master = master + strlen("ifname/");
data/network-manager-1.27.91/clients/cli/connections.c:3669:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        master = master + strlen("uuid/");
data/network-manager-1.27.91/clients/cli/connections.c:3673:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        master = master + strlen("id/");
data/network-manager-1.27.91/clients/cli/connections.c:5754:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (max < strlen(id))
data/network-manager-1.27.91/clients/cli/connections.c:5755:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                max = strlen(id);
data/network-manager-1.27.91/clients/cli/connections.c:5897:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len      = strlen(text);
data/network-manager-1.27.91/clients/cli/devices.c:1458:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = 0; i < strlen(ret); i++) {
data/network-manager-1.27.91/clients/cli/devices.c:3743:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!bssid1_arr && strlen(param_user) > 32) {
data/network-manager-1.27.91/clients/cli/devices.c:3777:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_variant_new_fixed_array(G_VARIANT_TYPE_BYTE, param_user, strlen(param_user), 1));
data/network-manager-1.27.91/clients/cli/devices.c:3886:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                GBytes *ssid = g_bytes_new(param_user, strlen(param_user));
data/network-manager-1.27.91/clients/cli/devices.c:3998:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(ssid) > 32)
data/network-manager-1.27.91/clients/cli/devices.c:4000:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid_bytes = g_bytes_new(ssid, strlen(ssid));
data/network-manager-1.27.91/clients/cli/devices.c:4296:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(*argv) > 32) {
data/network-manager-1.27.91/clients/cli/devices.c:4301:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            ssid_bytes = g_bytes_new(*argv, strlen(*argv));
data/network-manager-1.27.91/clients/cli/devices.c:4541:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                g_variant_new_fixed_array(G_VARIANT_TYPE_BYTE, ssid, strlen(ssid), 1));
data/network-manager-1.27.91/clients/cli/general.c:716:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(prefix);
data/network-manager-1.27.91/clients/cli/utils.c:408:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        end = start + strlen(start);
data/network-manager-1.27.91/clients/cli/utils.c:514:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            l = strlen(s);
data/network-manager-1.27.91/clients/cli/utils.c:567:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        end = start + strlen(start);
data/network-manager-1.27.91/clients/cli/utils.c:1252:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        width1 = strlen(header_name);
data/network-manager-1.27.91/clients/cli/utils.c:1273:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            width1 = strlen(title);
data/network-manager-1.27.91/clients/cli/utils.c:1333:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    width1 = strlen(prefix);
data/network-manager-1.27.91/clients/cli/utils.c:1358:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        width1 = strlen(text);
data/network-manager-1.27.91/clients/cli/utils.c:1429:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        rb = read(STDIN_FILENO, buf, sizeof(buf));
data/network-manager-1.27.91/clients/cli/utils.c:1609:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        width1 = strlen(header_name);
data/network-manager-1.27.91/clients/cli/utils.c:1657:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    width1 = strlen(tmp);
data/network-manager-1.27.91/clients/cli/utils.c:1682:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                width1 = strlen(tmp);
data/network-manager-1.27.91/clients/cli/utils.c:1731:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            width1 = strlen(value);
data/network-manager-1.27.91/clients/cli/utils.c:1737:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                   strlen(value) > 0 ? value : not_set_str);
data/network-manager-1.27.91/clients/cloud-setup/nm-cloud-setup-utils.c:526:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return memmem(mem_data, mem_size, needle, strlen(needle));
data/network-manager-1.27.91/clients/cloud-setup/nm-cloud-setup-utils.c:552:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(needle);
data/network-manager-1.27.91/clients/common/nm-client-utils.c:190:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    input_ln = strlen(input);
data/network-manager-1.27.91/clients/common/nm-client-utils.c:192:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p_len = strlen(*p);
data/network-manager-1.27.91/clients/common/nm-client-utils.c:235:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(cmd);
data/network-manager-1.27.91/clients/common/nm-client-utils.c:236:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!len || len > strlen(pattern))
data/network-manager-1.27.91/clients/common/nm-client-utils.c:876:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(l_hash_val) != l_hash_val_len) {
data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:301:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    text_len = strlen(text);
data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:553:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_string_append_len(str, i_name, strlen(i_name) + 1);
data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:557:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_string_append_len(str, right, strlen(right) + 1);
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:123:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                str        = nm_strndup_a(200, str, strlen(str), &str_clone_free);
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:472:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (c_len != strlen(contents)) {
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:554:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (c_len != strlen(contents)) {
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2104:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(value) > 32) {
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2109:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(value, strlen(value));
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2562:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    text_len = text ? strlen(text) : 0;
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2672:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    text_len = text ? strlen(text) : 0;
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:3057:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!NM_IN_SET(strlen(value), 5, 6)) {
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:3156:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_assert(strlen(str->str) == str->len);
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:3243:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(value) > 1 && matches(value, "static")) {
data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:4120:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    idx = property_info->property_name[strlen(property_info->property_name) - 1] - '0';
data/network-manager-1.27.91/clients/common/nm-polkit-listener.c:396:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_str_buf_init(&request->out_buffer, strlen(response) + 2u, TRUE);
data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:495:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        strlen(tmp) - NM_STRLEN("." NM_WIREGUARD_PEER_ATTR_PRESHARED_KEY));
data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:1060:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    request_id_setting_name = &request_id[strlen(request_id) - strlen(setting_name)];
data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:1060:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    request_id_setting_name = &request_id[strlen(request_id) - strlen(setting_name)];
data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:179:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p1 = line + strlen(tag);
data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:180:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p2 = line + strlen(line) - 1;
data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:285:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(strlen(key) == key_len);
data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:375:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize len = strlen(cstr) - NM_STRLEN(".conf");
data/network-manager-1.27.91/clients/common/qrcodegen.c:145:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t textLen = strlen(text);
data/network-manager-1.27.91/clients/common/qrcodegen.c:990:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t                   len = strlen(digits);
data/network-manager-1.27.91/clients/common/qrcodegen.c:1025:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t                   len = strlen(text);
data/network-manager-1.27.91/clients/tui/newt/nmt-newt-utils.c:311:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = data ? strlen(data) : 0;
data/network-manager-1.27.91/clients/tui/nmt-device-entry.c:122:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(words[1]);
data/network-manager-1.27.91/clients/tui/nmt-page-wifi.c:145:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(text, strlen(text));
data/network-manager-1.27.91/dispatcher/nm-dispatcher-utils.c:31:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(line);
data/network-manager-1.27.91/dispatcher/tests/test-dispatcher-envp.c:539:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert_cmpstr(&i_value[strlen("PATH=")], ==, g_getenv("PATH"));
data/network-manager-1.27.91/libnm-core/nm-crypto-nss.c:431:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                (guint8 *) g_utf8_to_utf16(password, strlen(password), NULL, &ucs2_chars, NULL);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:95:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p_len = strlen(cipher_name);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:101:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((gsize) p_len == strlen(info->name)
data/network-manager-1.27.91/libnm-core/nm-crypto.c:119:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    taglen = strlen(tag);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:212:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    start += strlen(start_tag);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:240:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!strncmp(p, PROC_TYPE_TAG, strlen(PROC_TYPE_TAG))) {
data/network-manager-1.27.91/libnm-core/nm-crypto.c:249:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p += strlen(PROC_TYPE_TAG);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:258:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (!strncmp(p, DEK_INFO_TAG, strlen(DEK_INFO_TAG))) {
data/network-manager-1.27.91/libnm-core/nm-crypto.c:271:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p += strlen(DEK_INFO_TAG);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:369:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    start += strlen(start_tag);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:421:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    start += strlen(start_tag);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:476:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    num = strlen(src);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:539:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(password),
data/network-manager-1.27.91/libnm-core/nm-crypto.c:698:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    start += strlen(PEM_CERT_BEGIN);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:1057:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    enc_base64_len = strlen(enc_base64);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:1067:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret_len += strlen(pem->pdata[i]);
data/network-manager-1.27.91/libnm-core/nm-crypto.c:1073:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize       line_l = strlen(line);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:540:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = i + strlen(&name[i]);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:541:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(len == strlen(name));
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:593:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = i + strlen(&key[i]);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:598:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(len == strlen(key));
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1257:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            length += strlen(&tmp_string[length]);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1443:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        data_len = strlen(data);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1480:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_len    = strlen(path);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1649:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        val = g_bytes_new_take(path, strlen(path) + 1);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2081:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        key_name_idx = key_name + strlen(key_name);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:4109:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(base);
data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:4148:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.c:303:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(bin) != unescaped_len) {
data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.c:328:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(item);
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:337:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            val_len = strlen((char *) val_bin) + 1;
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:343:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            val_len = strlen((char *) val_bin) + 1;
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2491:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((!priv->password || !strlen(priv->password))
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2503:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!priv->pin || !strlen(priv->pin))
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2749:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((!priv->identity || !strlen(priv->identity))
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2750:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        && (!priv->anonymous_identity || !strlen(priv->anonymous_identity))) {
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2760:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (!strlen(priv->identity)) {
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2791:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((!priv->phase2_auth || !strlen(priv->phase2_auth))
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2792:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        && (!priv->phase2_autheap || !strlen(priv->phase2_autheap))) {
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2802:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (!strlen(priv->phase2_auth)) {
data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2851:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (!strlen(priv->identity)) {
data/network-manager-1.27.91/libnm-core/nm-setting-cdma.c:130:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (!strlen(priv->number)) {
data/network-manager-1.27.91/libnm-core/nm-setting-cdma.c:139:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (priv->username && !strlen(priv->username)) {
data/network-manager-1.27.91/libnm-core/nm-setting-connection.c:154:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ulen = strlen(str);
data/network-manager-1.27.91/libnm-core/nm-setting-connection.c:1299:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(priv->mud_url) > 255) {
data/network-manager-1.27.91/libnm-core/nm-setting-gsm.c:288:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize apn_len = strlen(priv->apn);
data/network-manager-1.27.91/libnm-core/nm-setting-gsm.c:343:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize nid_len = strlen(priv->network_id);
data/network-manager-1.27.91/libnm-core/nm-setting-gsm.c:395:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t      len = strlen(priv->sim_operator_id);
data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2250:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(out_xifname, bin, 16 /* IFNAMSIZ */);
data/network-manager-1.27.91/libnm-core/nm-setting-macsec.c:235:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(key) != (gsize) req_len) {
data/network-manager-1.27.91/libnm-core/nm-setting-pppoe.c:132:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (!strlen(priv->username)) {
data/network-manager-1.27.91/libnm-core/nm-setting-pppoe.c:141:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (priv->service && !strlen(priv->service)) {
data/network-manager-1.27.91/libnm-core/nm-setting-proxy.c:155:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(priv->pac_script) > 1 * 1024 * 1024) {
data/network-manager-1.27.91/libnm-core/nm-setting-team.c:195:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_target_host = strlen(target_host) + 1;
data/network-manager-1.27.91/libnm-core/nm-setting-team.c:335:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_target_host = strlen(target_host) + 1;
data/network-manager-1.27.91/libnm-core/nm-setting-team.c:336:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_source_host = strlen(source_host) + 1;
data/network-manager-1.27.91/libnm-core/nm-setting-user.c:94:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(key);
data/network-manager-1.27.91/libnm-core/nm-setting-user.c:184:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(val);
data/network-manager-1.27.91/libnm-core/nm-setting-vpn.c:485:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                secret_name = g_strndup(key_name, strlen(key_name) - NM_STRLEN("-flags"));
data/network-manager-1.27.91/libnm-core/nm-setting-wimax.c:100:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!strlen(priv->network_name)) {
data/network-manager-1.27.91/libnm-core/nm-setting-wired.c:813:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            || strlen(v->value_str) > 200) {
data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.c:952:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(_secret_public_key)                                        \
data/network-manager-1.27.91/libnm-core/nm-setting-wireless-security.c:980:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (priv->leap_username && !strlen(priv->leap_username)) {
data/network-manager-1.27.91/libnm-core/nm-team-utils.c:2371:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(js_str) > 1 * 1024 * 1024) {
data/network-manager-1.27.91/libnm-core/nm-utils.c:153:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_endpoint = strlen(endpoint) + 1;
data/network-manager-1.27.91/libnm-core/nm-utils.c:158:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l_host = strlen(host) + 1;
data/network-manager-1.27.91/libnm-core/nm-utils.c:444:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(lang) > 2) {
data/network-manager-1.27.91/libnm-core/nm-utils.c:1289:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    keylen = strlen(key);
data/network-manager-1.27.91/libnm-core/nm-utils.c:1329:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    psklen = strlen(psk);
data/network-manager-1.27.91/libnm-core/nm-utils.c:3212:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen = s ? strlen(s) : 0;
data/network-manager-1.27.91/libnm-core/nm-utils.c:3314:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_str_buf_append_len(&str, string1, strlen(string1) + 1u);
data/network-manager-1.27.91/libnm-core/nm-utils.c:3319:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            nm_str_buf_append_len(&str, s, strlen(s) + 1u);
data/network-manager-1.27.91/libnm-core/nm-utils.c:4656:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (len != strlen(bin)) {
data/network-manager-1.27.91/libnm-core/nm-utils.c:5064:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            gsize l = strlen(k1->data) + 1;
data/network-manager-1.27.91/libnm-core/nm-utils.c:5088:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l1 = strlen(v1) + 1;
data/network-manager-1.27.91/libnm-core/nm-utils.c:5092:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l2 = strlen(v2) + 1;
data/network-manager-1.27.91/libnm-core/nm-utils.c:5311:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(str) - 1;
data/network-manager-1.27.91/libnm-core/nm-utils.c:5771:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    base64_key_len = strlen(base64_key);
data/network-manager-1.27.91/libnm-core/tests/test-crypto.c:63:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (p = b64; p < (b64 + strlen (b64)); p += 64) {
data/network-manager-1.27.91/libnm-core/tests/test-crypto.c:392:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           strlen(md5_tests[i].password),
data/network-manager-1.27.91/libnm-core/tests/test-general.c:149:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_hash_update_mem(&h, str, strlen(str));
data/network-manager-1.27.91/libnm-core/tests/test-general.c:361:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s1 = &s1[strlen(str)];
data/network-manager-1.27.91/libnm-core/tests/test-general.c:363:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_assert(&(words[i - 1])[strlen(words[i - 1])] < words[i]);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:377:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            const gsize l_i = strlen(words[i]);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:450:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                const char *s = &(words[i - 1])[strlen(words[i - 1]) + 1];
data/network-manager-1.27.91/libnm-core/tests/test-general.c:839:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gsize       len = strlen(str);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:968:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                && strlen(options->pdata[options->len - 1]) > 0u) {
data/network-manager-1.27.91/libnm-core/tests/test-general.c:5544:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid    = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/libnm-core/tests/test-general.c:5618:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid    = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/libnm-core/tests/test-general.c:6723:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (endpoint[0] && endpoint[strlen(endpoint) - 1] != ' ') {
data/network-manager-1.27.91/libnm-core/tests/test-general.c:6888:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_assert(strlen(b) < buf_len);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:6994:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        _test_uuid(uuid_type, expected_uuid, str, strlen(str), type_args);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:7592:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define _test_uuid(expected_uuid, str, strlen, ...) \
data/network-manager-1.27.91/libnm-core/tests/test-general.c:7593:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    __test_uuid(expected_uuid, str, strlen, _nm_utils_uuid_generate_from_strings(__VA_ARGS__, NULL))
data/network-manager-1.27.91/libnm-core/tests/test-general.c:7685:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    val = str + strlen(sign);
data/network-manager-1.27.91/libnm-core/tests/test-general.c:8838:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert_cmpint(l, ==, strlen(str));
data/network-manager-1.27.91/libnm-core/tests/test-general.c:8846:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (expected && l == strlen(expected)) {
data/network-manager-1.27.91/libnm-core/tests/test-general.c:8893:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (str_len == strlen(str)) {
data/network-manager-1.27.91/libnm-core/tests/test-general.c:10042:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(strlen(result) == l);
data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:121:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(data);
data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:139:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    success = g_key_file_load_from_data(keyfile, str, strlen(str), G_KEY_FILE_NONE, &error);
data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:275:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    pfile = g_bytes_new(puri, strlen(puri) + 1);
data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:332:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_assert(val_len == -1 || strlen(path) == val_len);
data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:559:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(strlen(nm_setting_802_1x_get_ca_cert_path(s_8021x)), ==, 499);
data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:571:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(strlen(nm_setting_802_1x_get_private_key_path(s_8021x)), ==, 505);
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:167:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(l, ==, strlen(path) + NM_STRLEN(NM_SETTING_802_1X_CERT_SCHEME_PREFIX_PATH) + 1);
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:170:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(NM_SETTING_802_1X_CERT_SCHEME_PREFIX_PATH))
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:172:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p += strlen(NM_SETTING_802_1X_CERT_SCHEME_PREFIX_PATH);
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:173:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(memcmp(p, path, strlen(path)) == 0);
data/network-manager-1.27.91/libnm-core/tests/test-setting.c:174:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p += strlen(path);
data/network-manager-1.27.91/libnm/nm-libnm-utils.c:172:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            const char *eow = &p[strlen(ignored_phrases[i])];
data/network-manager-1.27.91/libnm/nm-libnm-utils.c:177:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                memmove(p, eow, strlen(eow) + 1); /* +1 for the \0 */
data/network-manager-1.27.91/libnm/nm-libnm-utils.c:206:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(p);
data/network-manager-1.27.91/libnm/nm-secret-agent-old.c:1072:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    id_len = strlen(identifier);
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:779:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        nr = read(fd, &c, 1);
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:809:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (strncmp(line->str, DATA_KEY_TAG, strlen(DATA_KEY_TAG)) == 0) {
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:814:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            key  = g_string_new(line->str + strlen(DATA_KEY_TAG));
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:817:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (strncmp(line->str, DATA_VAL_TAG, strlen(DATA_VAL_TAG)) == 0) {
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:824:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            val = g_string_new(line->str + strlen(DATA_VAL_TAG));
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:826:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (strncmp(line->str, SECRET_KEY_TAG, strlen(SECRET_KEY_TAG)) == 0) {
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:831:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            key  = g_string_new(line->str + strlen(SECRET_KEY_TAG));
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:834:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (strncmp(line->str, SECRET_VAL_TAG, strlen(SECRET_VAL_TAG)) == 0) {
data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:841:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            val = g_string_new(line->str + strlen(SECRET_VAL_TAG));
data/network-manager-1.27.91/libnm/tests/test-libnm.c:2883:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    g_assert(strlen(sp->name) > 0);
data/network-manager-1.27.91/shared/n-acd/src/util/timer.c:87:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(timer->fd, &v, sizeof(v));
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:862:91:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                r = n_dhcp4_outgoing_append(message, N_DHCP4_OPTION_ERROR_MESSAGE, error, strlen(error) + 1);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:967:91:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                r = n_dhcp4_outgoing_append(message, N_DHCP4_OPTION_ERROR_MESSAGE, error, strlen(error) + 1);
data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c:677:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                r = read(client->fd_timer, &v, sizeof(v));
data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c:116:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(ifname));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-glib.h:479:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bytes = g_bytes_new_take(string, strlen(string) + 1);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h:288:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_hash_update_mem(state, str, strlen(str));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h:300:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_hash_update(state, str, strlen(str) + 1);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:357:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen(contents);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:468:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n_read = read(fd, &((nm_str_buf_get_str_unsafe(out_string))[out_string->len]), buf_available);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.c:126:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        _gstr_append_string_len(gstr, str, strlen(str));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.c:162:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(strlen(JANSSON_SONAME) > 0);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c:81:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_filename = strlen(filename);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c:82:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_group    = strlen(group_name);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1364:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l   = strlen(str);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1384:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_assert(_out_str_free_ssac || ((alloca_maxlen) > (str ? strlen(str) : 0u)));            \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1390:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                gsize _l = strlen(_str_ssac);                                                     \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1408:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (g_ascii_isspace(str[0]) || g_ascii_isspace(str[strlen(str) - 1]))
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1448:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_assert(strlen(suffix) == NM_STRLEN(suffix));                                         \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1450:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (_str_has_suffix && ((_l = strlen(_str_has_suffix)) >= NM_STRLEN(suffix))               \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1459:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_assert(strlen(suffix) == NM_STRLEN(suffix));                                         \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1461:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (_str_has_suffix && ((_l = strlen(_str_has_suffix)) > NM_STRLEN(suffix))                \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1566:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(s, str, len);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1690:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            const gsize _strlen_trunc = NM_MIN(strlen(_str), _trunc_at); \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1750:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const gsize       _name_len      = strlen(_name);                                  \
data/network-manager-1.27.91/shared/nm-glib-aux/nm-ref-string.h:20:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return cstr ? nm_ref_string_new_len(cstr, strlen(cstr)) : NULL;
data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.c:54:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(secret);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.c:75:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(secret);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:835:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = nm_memdup_maybe_a(300, text, strlen(text) + 1, &s_free);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1750:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                s_last = &s[strlen(s) - 1];
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1826:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    str_len = strlen(str);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1926:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(strlen(ret) == j);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2053:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            str_out = g_new(char, strlen(str) + 1);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2639:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2720:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            gsize l = strlen(str);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2795:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buflen = strlen(str);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2890:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert((!res && len == 0) || (strlen(res) <= len));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3020:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        k = read(fd, p, nbytes);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3642:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            l = strlen(strv[i]) + 1u;
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:4502:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buffer_len = strlen(hexstr) / 2 + 3;
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:4618:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            q = string + strlen(string);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5343:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dest = ret = g_malloc(strlen(src) * 2 + 1);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5481:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_len = strlen(name);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5493:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize       l = strlen(n);
data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h:236:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_str_buf_append_len(strbuf, str, strlen(str));
data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h:244:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return nm_str_buf_append_len0(strbuf, str, strlen(str));
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:200:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            l   = strlen(input) + 1;
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:203:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(dup) < 10)
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:216:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert(strlen(dup) <= l);
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:221:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(input) < l)
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:222:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                g_assert(nm_utils_memeqzero(&dup[strlen(input)], l - strlen(input)));
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:222:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                g_assert(nm_utils_memeqzero(&dup[strlen(input)], l - strlen(input)));
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:349:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#define _STRV_CMP(a1, l1, a2, l2, equal)                                                            \
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:369:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (equal) {                                                                                \
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:436:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(!s4 || strlen(s4) <= strlen(str));
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:436:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(!s4 || strlen(s4) <= strlen(str));
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:437:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (s4 && s4 == &str[strlen(str) - strlen(s4)]) {
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:437:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (s4 && s4 == &str[strlen(str) - strlen(s4)]) {
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:440:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (s4 && strlen(s4) >= 10) {
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:504:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_assert_cmpint(strlen(str_hex), ==, expected_strlen);
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:516:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert(strlen(str_hex) >= 5);
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:604:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(s1->len, ==, strlen("hallo"));
data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:619:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(s2->len, >, strlen(s2->str));
data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:335:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_assert(strlen(prefix) == NM_STRLEN(prefix));                                      \
data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:345:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_assert(strlen(suffix) == NM_STRLEN(suffix));                                        \
data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:347:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (_str_has_suffix && ((_l = strlen(_str_has_suffix)) >= NM_STRLEN(suffix))              \
data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:367:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_assert(strlen(suffix) == NM_STRLEN(suffix));                                        \
data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:369:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (_str_has_suffix && ((_l = strlen(_str_has_suffix)) > NM_STRLEN(suffix))               \
data/network-manager-1.27.91/shared/nm-udev-aux/nm-udev-utils.c:56:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                unescaped = g_malloc(l + strlen(p) + 1 - 3);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:399:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            } else if (!g_ascii_strncasecmp(debug, "log-level=", strlen("log-level="))) {
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:401:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                log_level = c_log_level = g_strdup(&debug[strlen("log-level=")]);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:410:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            } else if (!g_ascii_strncasecmp(debug, "log-domains=", strlen("log-domains="))) {
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:412:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                log_domains = c_log_domains = g_strdup(&debug[strlen("log-domains=")]);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:413:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            } else if (!g_ascii_strncasecmp(debug, "sudo-cmd=", strlen("sudo-cmd="))) {
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:415:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                sudo_cmd = g_strdup(&debug[strlen("sudo-cmd=")]);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:418:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            } else if (!g_ascii_strncasecmp(debug, "p=", strlen("p="))) {
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:421:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                g_ptr_array_add(p_tests, g_strdup(&debug[strlen("p=")]));
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:422:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            } else if (!g_ascii_strncasecmp(debug, "s=", strlen("s="))) {
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:425:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                g_ptr_array_add(s_tests, g_strdup(&debug[strlen("s=")]));
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1408:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(m && strlen(m) == sizeof(u) - 1);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1641:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpint(strlen(contents), ==, len);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1657:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _size = strlen(_content);                                         \
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:2397:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        strlen(keyfile_str),
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:2468:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert_cmpint(_l, ==, strlen(_str));                            \
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:2678:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_assert_cmpint(strlen(d1), ==, d1_len);
data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:2679:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        data_len = strlen(data);
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:57:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return env_name_is_valid_n(e, strlen(e));
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:77:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(e) > sc_arg_max() - 3)
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:100:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(e) > sc_arg_max() - 1)
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:248:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                size_t l = strlen(pattern);
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:465:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strv_env_get_n(l, name, strlen(name), 0);
data/network-manager-1.27.91/shared/systemd/src/basic/env-util.h:32:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return replace_env_n(format, strlen(format), env, flags);
data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:104:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return cescape_length(s, strlen(s));
data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:379:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ans = new(char, MIN(strlen(s), console_width) * 4 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:383:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memset(ans, '_', MIN(strlen(s), console_width) * 4);
data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:384:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ans[MIN(strlen(s), console_width) * 4] = 0;
data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:491:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r = new(char, strlen(s)*2+1);
data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:520:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r = new(char, (style == ESCAPE_POSIX) + 1 + strlen(s)*2 + 1 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/escape.h:55:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return cunescape_length(s, strlen(s), flags, ret);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:338:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(blob);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:428:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                        k = read(fd, buf, size + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:739:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        t += strlen(pattern);
data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:1248:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        k = fgetc(f);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:57:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(path);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:292:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        u = umask(0777);
data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:294:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask(u);
data/network-manager-1.27.91/shared/systemd/src/basic/hash-funcs.c:11:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        siphash24_compress(p, strlen(p) + 1, state);
data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:125:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                l = strlen(p);
data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:316:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                l = strlen(p);
data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:718:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                l = strlen(p);
data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.c:245:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (sethostname(s, strlen(s)) < 0)
data/network-manager-1.27.91/shared/systemd/src/basic/in-addr-util.c:418:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p = x + strlen(x);
data/network-manager-1.27.91/shared/systemd/src/basic/in-addr-util.c:419:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l -= strlen(x);
data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c:39:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                l = read(fd, buf, sizeof(buf));
data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c:72:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                k = read(fd, p, nbytes);
data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c:315:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r = iovw_put(iovw, x, strlen(x));
data/network-manager-1.27.91/shared/systemd/src/basic/io-util.h:72:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define IOVEC_INIT_STRING(string) IOVEC_INIT((char*) string, strlen(string))
data/network-manager-1.27.91/shared/systemd/src/basic/parse-util.c:255:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                p = e + strlen(table[i].suffix);
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:186:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r = new(char, n_parents * 3 + strlen(t) + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:428:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  lvalue, strlen(path), fatal ? "" : ", ignoring");
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:563:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        sz += 1 + strlen(p);
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:819:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = k = strlen(path);
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:891:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(p) >= PATH_MAX) /* PATH_MAX is counted *with* the trailing NUL byte */
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:936:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        k = strlen(filename);
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:136:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        _l = strlen(_root) + 1 + strlen(_path) + 1;     \
data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:136:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        _l = strlen(_root) + 1 + strlen(_path) + 1;     \
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:244:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(nn, name, nn_size);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:283:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(mm, name, mm_size);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:313:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t l = strlen(name);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:326:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                k = strlen(program_invocation_name);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:327:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(program_invocation_name, name, k);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:343:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        k = strlen(saved_argv[0]);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:344:25:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                        strncpy(saved_argv[0], name, k);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:353:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        memzero(saved_argv[i], strlen(saved_argv[i]));
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:499:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        l += strlen(field);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:647:42:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
int get_process_umask(pid_t pid, mode_t *umask) {
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:652:16:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        assert(umask);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:661:30:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        return parse_mode(m, umask);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:882:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(field);
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:26:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        _r_ = newa(char, STRLEN("/proc/self/") + strlen(_field_) + 1); \
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:29:90:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        _r_ = newa(char, STRLEN("/proc/") + DECIMAL_STR_MAX(pid_t) + 1 + strlen(_field_) + 1); \
data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:50:42:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
int get_process_umask(pid_t pid, mode_t *umask);
data/network-manager-1.27.91/shared/systemd/src/basic/siphash24.h:68:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        siphash24_compress(in, strlen(in), state);
data/network-manager-1.27.91/shared/systemd/src/basic/siphash24.h:76:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return siphash24(s, strlen(s) + 1, k);
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:714:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(p) >= ALTIFNAMSIZ)
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:717:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(p) >= IFNAMSIZ)
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:754:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(p) >= IFNAMSIZ)
data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:1133:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(path);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:47:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sl = strlen(s);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:48:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pl = strlen(postfix);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:68:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sl = strlen(s);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:69:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pl = strlen(postfix);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:94:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sl = strlen(s);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:95:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        wl = strlen(word);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:133:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        a = strlen(s);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:156:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                l = strlen(x);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:166:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        n = strlen(t);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:637:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        old_len = strlen(old_string);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:638:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        new_len = strlen(new_string);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:640:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(text);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:718:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        isz = _isz ? *_isz : strlen(*ibuf);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:848:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                n = strlen(t);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:904:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(s);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:935:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        b = strdup(x + strlen(sep));
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:983:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (*p && s && strneq(*p, s, l) && (l > strlen(*p) || (*p)[l] == '\0'))
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:1023:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        explicit_bzero_safe(x, strlen(x));
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:89:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(prefix);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:99:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(prefix);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:123:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        _len_ += strlen(_appendees_[_i_]);              \
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:168:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return ellipsize_mem(s, strlen(s), length, percent);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:204:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(s);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:209:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, src, buf_len);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:217:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t n = strlen(token);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:235:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t n = strlen(token);
data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:254:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *t = realloc(*p, strlen(*p) + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/strv.c:384:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        k = strlen(separator);
data/network-manager-1.27.91/shared/systemd/src/basic/strv.c:397:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                n += m + strlen(*s) * (1 + needs_escaping);
data/network-manager-1.27.91/shared/systemd/src/basic/strv.c:731:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                z = strlen(*i);
data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.c:46:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strnpcpy(dest, size, src, strlen(src));
data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.c:99:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strnscpy(dest, size, src, strlen(src));
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:379:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                n = strlen(buf);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:387:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n = strlen(buf);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:400:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                tn = strlen(tm.tm_zone);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:508:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                strncpy(p, "infinity", l-1);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:514:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
                strncpy(p, "0", l-1);
data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:755:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                skip = strlen(day_nr[i].name);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:125:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        t = new(char, strlen(p) + 2 + strlen(extra) + 6 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:125:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        t = new(char, strlen(p) + 2 + strlen(extra) + 6 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:163:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        t = new(char, strlen(p) + 2 + strlen(extra) + 16 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:163:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        t = new(char, strlen(p) + 2 + strlen(extra) + 16 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:203:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        t = new(char, strlen(p) + 3 + strlen(extra) + 16 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:203:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        t = new(char, strlen(p) + 3 + strlen(extra) + 16 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/umask-util.h:11:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask(*u & 0777);
data/network-manager-1.27.91/shared/systemd/src/basic/umask-util.h:24:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        for (_cleanup_umask_ mode_t _saved_umask_ = umask(mask) | S_IFMT; \
data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c:183:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p = s = malloc(strlen(str) * 4 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c:228:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p = s = prev_s = malloc(strlen(str) * 4 + 1);
data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c:271:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        s = mempcpy(s, UTF8_REPLACEMENT_CHARACTER, strlen(UTF8_REPLACEMENT_CHARACTER));
data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c:284:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s = mempcpy(s, "…", strlen("…"));
data/network-manager-1.27.91/shared/systemd/src/basic/util.c:122:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                n = read(fd, contents, sizeof(contents));
data/network-manager-1.27.91/shared/systemd/src/basic/util.c:138:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                n = read(fd, contents, sizeof(contents));
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:349:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(buffer);
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:525:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        x = a + strlen(a);
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:526:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        y = b + strlen(b);
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:989:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(name);
data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1016:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r = dns_label_escape(name, strlen(name), escaped, sizeof(escaped));
data/network-manager-1.27.91/src/NetworkManagerUtils.c:1114:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(path <= &abs_filename[strlen(abs_filename)]);
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:332:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(object_path) + 1;
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:761:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l         = strlen(bdaddr) + 1;
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:702:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    src_l = strlen(adapter) + 1;
data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:703:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dst_l = strlen(remote) + 1;
data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:278:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              uuid ? strlen(uuid) + 1u : 0u);
data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:316:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              uuid ? strlen(uuid) + 1u : 0u);
data/network-manager-1.27.91/src/devices/nm-device.c:1562:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guchar *) stable_id, strlen(stable_id) + 1);
data/network-manager-1.27.91/src/devices/nm-device.c:1563:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guchar *) iface, strlen(iface) + 1);
data/network-manager-1.27.91/src/devices/nm-device.c:1573:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        iaid  = nm_utils_create_dhcp_iaid(TRUE, (const guint8 *) iface, strlen(iface));
data/network-manager-1.27.91/src/devices/nm-device.c:1586:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    iaid        = nm_utils_create_dhcp_iaid(TRUE, (const guint8 *) iface, strlen(iface));
data/network-manager-1.27.91/src/devices/nm-device.c:1774:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guchar *) stable_id, strlen(stable_id) + 1);
data/network-manager-1.27.91/src/devices/nm-device.c:14568:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(b);
data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.c:261:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(name, NM_MIN(32u, strlen(name)));
data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:297:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gsize           strsize = strlen(name) + 1;
data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:446:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    new_ssid = g_bytes_new(name, strlen(name));
data/network-manager-1.27.91/src/devices/wifi/nm-wifi-utils.c:881:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (ssid_l == strlen(manf_defaults[i])) {
data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:70:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid_b = g_bytes_new(ssid, strlen(ssid));
data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:121:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            tmp = g_bytes_new(item->str, strlen(item->str));
data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:212:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tmp = g_bytes_new(ssid, strlen(ssid));
data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:1430:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_variant_new_fixed_array(G_VARIANT_TYPE_BYTE, ssid, strlen(ssid), 1));
data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:1448:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_assert(nm_utils_gbytes_equal_mem(bytes, ssid, strlen(ssid)));
data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.c:112:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (mcc && strlen(mcc) && mnc && strlen(mnc)) {
data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.c:112:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (mcc && strlen(mcc) && mnc && strlen(mnc)) {
data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:825:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                               check_val ? len : strlen(str_value),
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:77:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(ss);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:251:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (s[strlen(s) - 1] == ';')
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:252:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s[strlen(s) - 1] = '\0';
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:281:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (ptr[0] == '\0' || strlen(ptr) + 1 > size)
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:386:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!strncmp(p, TIMEOUT_TAG, strlen(TIMEOUT_TAG))
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:387:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                || !strncmp(p, RETRY_TAG, strlen(RETRY_TAG)))
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:390:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!strncmp(p, CLIENTID_TAG, strlen(CLIENTID_TAG))) {
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:403:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strncmp(p, HOSTNAME4_TAG, strlen(HOSTNAME4_TAG)) == 0)
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:405:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strncmp(p, FQDN_TAG, strlen(FQDN_TAG)) == 0)
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:424:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!strncmp(p, REQ_TAG, strlen(REQ_TAG))) {
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:426:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                p += strlen(REQ_TAG);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:438:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!strncmp(p, ALSOREQ_TAG, strlen(ALSOREQ_TAG))) {
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:440:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                p += strlen(ALSOREQ_TAG);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:573:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len       = strlen(duid);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:636:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ((char *) p)[strlen(p) - 2] = '\0';
data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper.c:78:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strncmp(name, *p, strlen(*p)) == 0)
data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper.c:95:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              g_variant_new_fixed_array(G_VARIANT_TYPE_BYTE, val, strlen(val), 1));
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1391:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                      strlen(mud_url));
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1420:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                fqdn_len = strlen(hostname);
data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1440:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                          strlen(hostname));
data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:251:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!str || !strlen(str))
data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:755:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len  = strlen(client_id);
data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:736:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    COMPARE_ID(nothex, TRUE, nothex, strlen(nothex));
data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:738:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    COMPARE_ID(somehex, TRUE, somehex, strlen(somehex));
data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:739:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    COMPARE_ID(nocolons, TRUE, nocolons, strlen(nocolons));
data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:740:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    COMPARE_ID(endcolon, TRUE, endcolon, strlen(endcolon));
data/network-manager-1.27.91/src/dns/nm-dns-manager.c:633:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            gsize       l = strlen(s);
data/network-manager-1.27.91/src/initrd/nm-initrd-generator.c:172:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!g_file_set_contents(hostname_file, data, strlen(data), &error)) {
data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c:828:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (vlanid = vlan + strlen(vlan); vlanid > vlan; vlanid--) {
data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c:889:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bus_id_len   = strlen(bus_id);
data/network-manager-1.27.91/src/main-utils.c:92:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (write(fd, pid, strlen(pid)) < 0) {
data/network-manager-1.27.91/src/main-utils.c:249:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask(022);
data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c:446:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len += strlen(dns_server->domain) + 2;
data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c:460:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                uint8_t domain_len = strlen(dns_domain->domain);
data/network-manager-1.27.91/src/nm-auth-utils.c:76:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(call->permission && strlen(call->permission) > 0);
data/network-manager-1.27.91/src/nm-config-data.c:927:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen(dns_config->searches[i]) + 1);
data/network-manager-1.27.91/src/nm-config-data.c:933:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen(dns_config->options[i]) + 1);
data/network-manager-1.27.91/src/nm-config-data.c:944:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_checksum_update(sum, (guchar *) domain->name, strlen(domain->name) + 1);
data/network-manager-1.27.91/src/nm-config-data.c:950:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen(domain->servers[j]) + 1);
data/network-manager-1.27.91/src/nm-config-data.c:956:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen(domain->options[j]) + 1);
data/network-manager-1.27.91/src/nm-config-data.c:1021:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    domain_prefix_len = strlen(domain_prefix);
data/network-manager-1.27.91/src/nm-config-data.c:1600:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize l = strlen(prefix);
data/network-manager-1.27.91/src/nm-config.c:245:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(new_value);
data/network-manager-1.27.91/src/nm-config.c:1055:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            key_len   = strlen(key);
data/network-manager-1.27.91/src/nm-config.c:2436:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    connection_uuid_len   = connection_uuid ? strlen(connection_uuid) + 1 : 0;
data/network-manager-1.27.91/src/nm-config.c:2437:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    perm_hw_addr_fake_len = perm_hw_addr_fake ? strlen(perm_hw_addr_fake) + 1 : 0;
data/network-manager-1.27.91/src/nm-config.c:2685:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fn_len = strlen(fn);
data/network-manager-1.27.91/src/nm-connectivity.c:597:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(cb_data->concheck.response_good_cnt < strlen(response));
data/network-manager-1.27.91/src/nm-connectivity.c:599:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    response_len = strlen(response);
data/network-manager-1.27.91/src/nm-core-utils.c:427:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    log_name_len = strlen(LOG_NAME_FMT) + 20 + strlen(log_name);
data/network-manager-1.27.91/src/nm-core-utils.c:427:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    log_name_len = strlen(LOG_NAME_FMT) + 20 + strlen(log_name);
data/network-manager-1.27.91/src/nm-core-utils.c:1753:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string_value = g_new(char, strlen(value) + 1);
data/network-manager-1.27.91/src/nm-core-utils.c:1988:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize    pattern_len = strlen(pattern);
data/network-manager-1.27.91/src/nm-core-utils.c:2081:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    parent_len = strlen(parent_iface);
data/network-manager-1.27.91/src/nm-core-utils.c:2103:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_return_val_if_fail(strlen(parent_name) < IFNAMSIZ, NULL);
data/network-manager-1.27.91/src/nm-core-utils.c:2609:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path += strlen(ifname);
data/network-manager-1.27.91/src/nm-core-utils.c:2913:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_checksum_update(sum, (const guchar *) slen, strlen(slen));
data/network-manager-1.27.91/src/nm-core-utils.c:2919:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guchar *) machine_id_data->str, strlen(machine_id_data->str));
data/network-manager-1.27.91/src/nm-core-utils.c:3522:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_checksum_update(sum, (guchar *) stable_id_generated, strlen(stable_id_generated));
data/network-manager-1.27.91/src/nm-core-utils.c:3530:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(strlen(base64) == 28);
data/network-manager-1.27.91/src/nm-core-utils.c:3542:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_string_append_printf(str, "=%zu{%s}", strlen(substitution), substitution);
data/network-manager-1.27.91/src/nm-core-utils.c:3739:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_checksum_update(sum, (const guchar *) ifname, strlen(ifname) + 1);
data/network-manager-1.27.91/src/nm-core-utils.c:3740:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_checksum_update(sum, (const guchar *) network_id, strlen(network_id) + 1);
data/network-manager-1.27.91/src/nm-core-utils.c:3916:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_checksum_update(sum, (const guchar *) (ifname ?: ""), ifname ? (strlen(ifname) + 1) : 1);
data/network-manager-1.27.91/src/nm-core-utils.c:3917:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_checksum_update(sum, (const guchar *) stable_id, strlen(stable_id) + 1);
data/network-manager-1.27.91/src/nm-dbus-manager.c:549:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize l = strlen(sender) + 1;
data/network-manager-1.27.91/src/nm-dcb.c:318:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        (errmsg && strlen(errmsg)) ? errmsg : outmsg);
data/network-manager-1.27.91/src/nm-dispatcher.c:98:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_log_ifname   = log_ifname ? (strlen(log_ifname) + 1) : 0u;
data/network-manager-1.27.91/src/nm-dispatcher.c:99:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_log_con_uuid = log_con_uuid ? (strlen(log_con_uuid) + 1) : 0u;
data/network-manager-1.27.91/src/nm-firewall-manager.c:294:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            && NM_IN_SET(error->message[strlen(non_error)], '\0', ':')) {
data/network-manager-1.27.91/src/nm-ip4-config.c:2339:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(domain);
data/network-manager-1.27.91/src/nm-ip4-config.c:2879:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_checksum_update(sum, (const guint8 *) s, strlen(s));
data/network-manager-1.27.91/src/nm-ip4-config.c:2890:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guint8 *) s, strlen(s));
data/network-manager-1.27.91/src/nm-ip4-config.c:2895:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guint8 *) s, strlen(s));
data/network-manager-1.27.91/src/nm-ip4-config.c:2900:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guint8 *) s, strlen(s));
data/network-manager-1.27.91/src/nm-ip6-config.c:2369:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guint8 *) s, strlen(s));
data/network-manager-1.27.91/src/nm-ip6-config.c:2374:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guint8 *) s, strlen(s));
data/network-manager-1.27.91/src/nm-ip6-config.c:2379:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        g_checksum_update(sum, (const guint8 *) s, strlen(s));
data/network-manager-1.27.91/src/nm-l3-config-data.c:1305:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(domain);
data/network-manager-1.27.91/src/nm-logging.c:536:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_assert(strlen(_all_logging_domains_to_str) == sizeof(_all_logging_domains_to_str) - 1);
data/network-manager-1.27.91/src/nm-logging.c:595:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _iovec_set(iov, str, strlen(str));
data/network-manager-1.27.91/src/nm-logging.c:629:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            nm_assert(_len == strlen(_buf));                                       \
data/network-manager-1.27.91/src/nm-logging.c:640:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            nm_assert(_str_arg &&strlen(_str_arg) < (max_str_len));     \
data/network-manager-1.27.91/src/nm-manager.c:6632:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(line) > 0 && g_strcmp0(line, "lo=lo") != 0) {
data/network-manager-1.27.91/src/nm-manager.c:7868:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(KERNEL_FIRMWARE_DIR)) {
data/network-manager-1.27.91/src/nm-policy.c:505:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = sethostname(hostname, strlen(hostname));
data/network-manager-1.27.91/src/nm-policy.c:563:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(hostname) >= HOST_NAME_BUFSIZE - 1) {
data/network-manager-1.27.91/src/nm-test-utils-core.h:83:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(!label || strlen(label) < NMP_IFNAMSIZ);
data/network-manager-1.27.91/src/platform/nm-fake-platform.c:237:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(!name || strlen(name) < IFNAMSIZ);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:1026:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            memmove(contents, cont, strlen(cont) + 1);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5207:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(value) + 1;
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5520:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len          = strlen(pathid);
data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7597:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    NLA_PUT(nlmsg, IFLA_IFNAME, strlen(name) + 1, name);
data/network-manager-1.27.91/src/platform/nm-netlink.h:257:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return nla_put(msg, attrtype, strlen(str) + 1, str);
data/network-manager-1.27.91/src/platform/nm-netlink.h:306:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define NLA_PUT_STRING(msg, attrtype, value) NLA_PUT(msg, attrtype, (int) strlen(value) + 1, value)
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:392:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(needle && strlen(needle) < ETH_GSTRING_LEN);
data/network-manager-1.27.91/src/platform/nm-platform-utils.c:408:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(needle && strlen(needle) < ETH_GSTRING_LEN);
data/network-manager-1.27.91/src/platform/nm-platform.c:2041:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) + 1 > IFNAMSIZ)
data/network-manager-1.27.91/src/platform/nm-platform.c:2569:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_sprintf_buf_unsafe_a(strlen(category) + strlen(option) + 2, "%s/%s", category, option);
data/network-manager-1.27.91/src/platform/nm-platform.c:2569:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_sprintf_buf_unsafe_a(strlen(category) + strlen(option) + 2, "%s/%s", category, option);
data/network-manager-1.27.91/src/platform/nm-platform.c:2590:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_sprintf_buf_unsafe_a(strlen(category) + strlen(option) + 2, "%s/%s", category, option);
data/network-manager-1.27.91/src/platform/nm-platform.c:2590:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nm_sprintf_buf_unsafe_a(strlen(category) + strlen(option) + 2, "%s/%s", category, option);
data/network-manager-1.27.91/src/platform/nm-platform.c:2717:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(b);
data/network-manager-1.27.91/src/platform/nm-platform.c:2727:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(b);
data/network-manager-1.27.91/src/platform/nm-platform.c:3552:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_return_val_if_fail(!label || strlen(label) < sizeof(((NMPlatformIP4Address *) NULL)->label),
data/network-manager-1.27.91/src/platform/nm-platform.c:6441:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(strlen(buf) < buf_size);
data/network-manager-1.27.91/src/platform/nm-platform.h:1429:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                const gsize _l = strlen(path);                      \
data/network-manager-1.27.91/src/platform/nmp-object.c:1004:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(b);
data/network-manager-1.27.91/src/platform/nmp-object.c:1014:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            l = strlen(b);
data/network-manager-1.27.91/src/platform/nmp-object.c:1024:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            l = strlen(b);
data/network-manager-1.27.91/src/platform/nmp-object.c:2093:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(strlen(ifname) < IFNAMSIZ);
data/network-manager-1.27.91/src/platform/nmp-object.c:2292:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(ifname) >= IFNAMSIZ)
data/network-manager-1.27.91/src/platform/tests/test-common.c:2362:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                r = read(pipefd_p2c[0], read_buf, sizeof(read_buf));
data/network-manager-1.27.91/src/platform/tests/test-common.c:2374:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(pipefd_c2p[0], &errsv, sizeof(errsv));
data/network-manager-1.27.91/src/platform/tests/test-common.c:2448:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_return_val_if_fail(ns_name && ns_name[0] && strlen(ns_name) < 50, 0);
data/network-manager-1.27.91/src/platform/tests/test-platform-general.c:66:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(s);
data/network-manager-1.27.91/src/settings/nm-agent-manager.c:310:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    id_len = strlen(identifier);
data/network-manager-1.27.91/src/settings/nm-settings-plugin.h:130:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(klass && klass->plugin_name && strlen(klass->plugin_name) > 0);
data/network-manager-1.27.91/src/settings/nm-settings-utils.c:110:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            gsize l = strlen(uuid) + 1;
data/network-manager-1.27.91/src/settings/nm-settings.c:187:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_p_1 = strlen(uuid) + 1;
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-plugin.c:154:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                nm_assert(strlen(storage->unmanaged_spec) > 0);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-plugin.c:157:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                nm_assert(strlen(storage->unrecognized_spec) > 0);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:179:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    secret = nm_secret_buf_new(strlen(password_raw) / 2 + 3);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2161:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strcmp(device, item + strlen(IFCFG_TAG)) != 0) {
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2806:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(v) != 8) {
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2854:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(val) != 8) {
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:3111:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (value[0] && strlen(value) < 64)
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:3114:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (NM_IN_SET(strlen(value), 10, 26)) {
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:3124:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (!strncmp(value, "s:", 2) && NM_IN_SET(strlen(value), 7, 15)) {
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:3382:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    plen = strlen(psk);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:4127:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (value && strlen(value))
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:4254:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize                  value_len = strlen(value);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:5349:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j = sanitized = g_malloc0(strlen(p) + 1);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:6382:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                i        = strlen(device);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:71:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len     = strlen(base);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:72:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tag_len = strlen(tag);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:88:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(base, IFCFG_TAG, strlen(IFCFG_TAG)) != 0) {
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:91:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if (strncmp(base, KEYS_TAG, strlen(KEYS_TAG)) != 0
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:92:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 && strncmp(base, ROUTE_TAG, strlen(ROUTE_TAG)) != 0
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:93:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 && strncmp(base, ROUTE6_TAG, strlen(ROUTE6_TAG)) != 0)
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:344:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(alias, IFCFG_TAG, strlen(IFCFG_TAG)))
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:348:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(ifcfg);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:754:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(tag_len == strlen(tag));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:1094:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize l = strlen(ti->key_name);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.h:137:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return nms_ifcfg_rh_utils_is_numbered_tag_impl(key, tag, strlen(tag), out_idx);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:709:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    if (strlen(key) == 5 || strlen(key) == 13) {
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:709:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    if (strlen(key) == 5 || strlen(key) == 13) {
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:757:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(str->str) && (dynamic_wep == FALSE))
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:772:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(str->str) && (dynamic_wep == FALSE))
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2856:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    base_ifcfg_name_len = strlen(base_ifcfg_name);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2859:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    base_name     = base_ifcfg_name + strlen(IFCFG_TAG);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2860:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    base_name_len = strlen(base_name);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:160:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    q = dest = g_malloc(strlen(source) * 4 + 1 + 3);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:212:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nm_assert(q - dest <= strlen(source) * 4 + 1 + 3);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:340:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *str = g_string_new_len(NULL, strlen(value) + 3);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:672:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            _line_link_parse(s, p, strlen(p));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:798:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memmove(line->key_with_prefix, line->key, strlen(line->key) + 1);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:159:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                j = strlen(uuid);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:193:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    s += strlen(search);
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:199:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                g_string_erase(str, i, strlen(search));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2629:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2712:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2745:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2786:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2840:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2914:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3207:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3310:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3352:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3532:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(nm_utils_gbytes_equal_mem(ssid, expected_ssid, strlen(expected_ssid)));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6329:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6427:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6521:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6616:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6714:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6815:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6911:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7019:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7124:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7234:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7361:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7497:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7612:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7733:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7852:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(ssid_data, strlen(ssid_data));
data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:8183:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ssid = g_bytes_new(str_ssid, strlen(str_ssid));
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:43:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_type = strlen(type) + 1;
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:44:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_name = strlen(name) + 1;
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:68:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_key  = strlen(key) + 1;
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:69:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l_data = strlen(data) + 1;
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:95:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(dst, " ");
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:138:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(line);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:111:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int     len = strlen(curr->data);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:145:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int     len = strlen(curr->data);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:167:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *endc       = valuec + strlen(valuec);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:170:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *result     = malloc(strlen(valuec) + 1);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:178:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(result_cur, delim, next - delim);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:182:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (*delim && strlen(valuec) > GPOINTER_TO_UINT(delim - valuec)) {
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:183:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(result_cur, delim, endc - delim);
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:205:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(value) >= 8 && strlen(value) <= 64)
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:205:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(value) >= 8 && strlen(value) <= 64)
data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:452:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(netmask_v) < 7) {
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-reader.c:139:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        gsize l = strlen(filename);
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:41:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(filename);
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:226:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        full_filename_tmp[strlen(full_filename_tmp) - 1] = '\0';
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:248:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    full_filename = g_strndup(full_filename_tmp, strlen(full_filename_tmp) - 1);
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:282:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            full_filename_tmp[strlen(full_filename_tmp) - 1] = '\0';
data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-writer.c:50:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            const char *p = path + strlen(info->keyfile_dir);
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:829:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpmem(ssid_data, ssid_len, expected_ssid, strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:884:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpmem(tmp, strlen(tmp), tmpssid, sizeof(tmpssid));
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:908:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert_cmpmem(ssid_data, ssid_len, expected_ssid, strlen(expected_ssid));
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:992:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(nm_utils_gbytes_equal_mem(ssid, expected_ssid, strlen(expected_ssid)));
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:1010:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(nm_utils_gbytes_equal_mem(ssid, expected_ssid, strlen(expected_ssid)));
data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:2160:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(nm_utils_gbytes_equal_mem(ssid, expected_ssid, strlen(expected_ssid)));
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:119:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(value);
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:239:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    opt->len   = strlen(opt->value);
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:545:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!nm_supplicant_config_add_option(self, "bssid", bssid, strlen(bssid), NULL, error))
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:572:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                    strlen(freqs),
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:645:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return nm_supplicant_config_add_option(self, name, field, strlen(field), hidden, error);
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:729:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!key || (key_len = strlen(key)) == 0)
data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:877:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t psk_len = strlen(psk);
data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:236:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gs_unref_bytes GBytes *bgscan          = g_bytes_new(bgscan_data, strlen(bgscan_data));
data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:451:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int                    short_psk       = strlen(psk) < 8;
data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:535:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(key2),
data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:541:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(key2),
data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:658:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gs_unref_bytes GBytes *bgscan          = g_bytes_new(bgscan_data, strlen(bgscan_data));
data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:710:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    gs_unref_bytes GBytes *bgscan          = g_bytes_new(bgscan_data, strlen(bgscan_data));
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:204:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                id = siphash24(name, strlen(name), HASH_KEY.bytes);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c:44:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        size_t len = strlen(*s);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c:60:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        size_t len = strlen(*s);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:213:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                size_t len = strlen(*s);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:255:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                size_t len = strlen(*s);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:66:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(name);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:504:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!ascii_is_valid(n) || strlen(n) >= IFALIASZ) {
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:567:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        assert_return(strlen(mudurl) <= 255, -EINVAL);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:581:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(*p) > 255)
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:942:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                               strlen(client->hostname), client->hostname);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:953:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       strlen(client->vendor_class_identifier),
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:962:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       strlen(client->mudurl),
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:465:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        assert_return(strlen(mudurl) <= UINT8_MAX, -EINVAL);
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:481:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(*p) > UINT16_MAX)
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:502:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(*p) > UINT8_MAX)
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:656:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                SD_DHCP6_OPTION_MUD_URL, strlen(client->mudurl),
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:687:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                SD_DHCP6_OPTION_MUD_URL, strlen(client->mudurl),
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:752:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                SD_DHCP6_OPTION_MUD_URL, strlen(client->mudurl),
data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:804:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                SD_DHCP6_OPTION_MUD_URL, strlen(client->mudurl),
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:2827:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ss = read(fd, &x, sizeof(x));
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:3003:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                n = read(d->fd, &si, sizeof(si));
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:3052:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        n = read(d->fd, &d->buffer, sizeof(d->buffer));
data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:45:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(s);
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:206:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    err = read(pipefd[0], &tmp, sizeof(tmp));
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:624:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert_cmpint(strlen(ifname),
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:626:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            MIN(15, strlen(parent_names[i]) + strlen(vlan_id_s)));
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:626:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            MIN(15, strlen(parent_names[i]) + strlen(vlan_id_s)));
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:628:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert(ifname[strlen(ifname) - strlen(vlan_id_s)] == '.');
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:628:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert(ifname[strlen(ifname) - strlen(vlan_id_s)] == '.');
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:629:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert(strncmp(ifname, parent_names[i], strlen(ifname) - strlen(vlan_id_s)) == 0);
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:629:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert(strncmp(ifname, parent_names[i], strlen(ifname) - strlen(vlan_id_s)) == 0);
data/network-manager-1.27.91/src/tests/test-core-with-expect.c:631:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                g_assert_cmpint(strlen(ifname), ==, 15);
data/network-manager-1.27.91/src/tests/test-core.c:1695:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            nm_utils_strbuf_append_bin(_buf, _len, _str, strlen(_str)); \
data/network-manager-1.27.91/src/tests/test-core.c:1723:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            nm_utils_strbuf_append_bin(_buf, _len, _str, _str ? strlen(_str) : 0); \
data/network-manager-1.27.91/src/tests/test-core.c:1770:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            g_assert_cmpint(strlen(str), ==, s_len);
data/network-manager-1.27.91/src/tests/test-core.c:1800:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (t_len > 0 && strlen(str) >= buf_len && (nmtst_get_rand_uint32() % 2)) {
data/network-manager-1.27.91/src/tests/test-core.c:1815:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    if (buf_len > 0 && strlen(str) + 1 > buf_len) {
data/network-manager-1.27.91/src/tests/test-core.c:1881:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    g_assert_cmpint(strlen(buf), ==, s_len);
data/network-manager-1.27.91/src/tests/test-core.c:2278:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    g_assert(strlen(machine_id_str) == 32);
data/network-manager-1.27.91/src/tests/test-core.c:2383:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    u64 = c_siphash_hash(HASH_KEY, (const guint8 *) d->ifname, strlen(d->ifname));
data/network-manager-1.27.91/src/tests/test-core.c:2400:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        strlen(d->ifname));
data/network-manager-1.27.91/src/tests/test-core.c:2426:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                        strlen(d->ifname))));
data/network-manager-1.27.91/src/tests/test-systemd.c:262:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                strlen(expected_base64),
data/network-manager-1.27.91/src/tests/test-systemd.c:270:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r = nm_sd_utils_unbase64mem(base64, strlen(base64), TRUE, &exp3_arr, &exp3_len);
data/network-manager-1.27.91/src/tests/test-systemd.c:286:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    r = nm_sd_utils_unbase64mem(base64, strlen(base64), TRUE, &exp_arr, &exp_len);
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:1088:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (priv->banner && strlen(priv->banner)) {
data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:2589:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!strlen(setting_name)) {

ANALYSIS SUMMARY:

Hits = 1990
Lines analyzed = 574134 in approximately 12.46 seconds (46074 lines/second)
Physical Source Lines of Code (SLOC) = 414828
Hits@level = [0] 106 [1] 696 [2] 1177 [3]  51 [4]  64 [5]   2
Hits@level+ = [0+] 2096 [1+] 1990 [2+] 1294 [3+] 117 [4+]  66 [5+]   2
Hits/KSLOC@level+ = [0+] 5.0527 [1+] 4.79717 [2+] 3.11937 [3+] 0.282045 [4+] 0.159102 [5+] 0.00482128
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.