Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/network-manager-1.27.91/libnm/nm-device-generic.c Examining data/network-manager-1.27.91/libnm/nm-device-ip-tunnel.c Examining data/network-manager-1.27.91/libnm/nm-device-infiniband.c Examining data/network-manager-1.27.91/libnm/nm-device-wifi-p2p.c Examining data/network-manager-1.27.91/libnm/nm-device-infiniband.h Examining data/network-manager-1.27.91/libnm/nm-device-wpan.c Examining data/network-manager-1.27.91/libnm/nm-device-6lowpan.c Examining data/network-manager-1.27.91/libnm/nm-device-ovs-port.h Examining data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c Examining data/network-manager-1.27.91/libnm/nm-device-bt.c Examining data/network-manager-1.27.91/libnm/nm-ip4-config.h Examining data/network-manager-1.27.91/libnm/nm-secret-agent-old.c Examining data/network-manager-1.27.91/libnm/nm-wifi-p2p-peer.c Examining data/network-manager-1.27.91/libnm/nm-device-team.h Examining data/network-manager-1.27.91/libnm/nm-ip4-config.c Examining data/network-manager-1.27.91/libnm/nm-device.h Examining data/network-manager-1.27.91/libnm/nm-device-vrf.c Examining data/network-manager-1.27.91/libnm/nm-dbus-helpers.c Examining data/network-manager-1.27.91/libnm/nm-vpn-connection.c Examining data/network-manager-1.27.91/libnm/nm-device-vrf.h Examining data/network-manager-1.27.91/libnm/nm-device-ethernet.c Examining data/network-manager-1.27.91/libnm/nm-device-ovs-bridge.h Examining data/network-manager-1.27.91/libnm/nm-dhcp6-config.c Examining data/network-manager-1.27.91/libnm/nm-device-wireguard.c Examining data/network-manager-1.27.91/libnm/nm-object.h Examining data/network-manager-1.27.91/libnm/nm-device-olpc-mesh.h Examining data/network-manager-1.27.91/libnm/nm-device-vlan.c Examining data/network-manager-1.27.91/libnm/nm-device-wimax.c Examining data/network-manager-1.27.91/libnm/nm-device-ovs-interface.c Examining data/network-manager-1.27.91/libnm/nm-device-ppp.c Examining data/network-manager-1.27.91/libnm/nm-device-ethernet.h Examining data/network-manager-1.27.91/libnm/nm-object-private.h Examining data/network-manager-1.27.91/libnm/nm-device-adsl.c Examining data/network-manager-1.27.91/libnm/nm-device-tun.h Examining data/network-manager-1.27.91/libnm/NetworkManager.h Examining data/network-manager-1.27.91/libnm/nm-dns-manager.h Examining data/network-manager-1.27.91/libnm/nm-libnm-utils.c Examining data/network-manager-1.27.91/libnm/nm-secret-agent-old.h Examining data/network-manager-1.27.91/libnm/nm-device-vxlan.h Examining data/network-manager-1.27.91/libnm/nm-access-point.h Examining data/network-manager-1.27.91/libnm/nm-libnm-aux/nm-libnm-aux.h Examining data/network-manager-1.27.91/libnm/nm-libnm-aux/nm-libnm-aux.c Examining data/network-manager-1.27.91/libnm/nm-dhcp6-config.h Examining data/network-manager-1.27.91/libnm/nm-ip-config.h Examining data/network-manager-1.27.91/libnm/nm-device-wireguard.h Examining data/network-manager-1.27.91/libnm/nm-vpn-plugin-old.c Examining data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.h Examining data/network-manager-1.27.91/libnm/nm-device-ovs-port.c Examining data/network-manager-1.27.91/libnm/nm-device-dummy.c Examining data/network-manager-1.27.91/libnm/nm-client.c Examining data/network-manager-1.27.91/libnm/nm-device-macsec.h Examining data/network-manager-1.27.91/libnm/nm-device-olpc-mesh.c Examining data/network-manager-1.27.91/libnm/nm-wimax-nsp.h Examining data/network-manager-1.27.91/libnm/nm-device-generic.h Examining data/network-manager-1.27.91/libnm/nm-device-private.h Examining data/network-manager-1.27.91/libnm/nm-vpn-editor.h Examining data/network-manager-1.27.91/libnm/nm-device-ppp.h Examining data/network-manager-1.27.91/libnm/nm-device-dummy.h Examining data/network-manager-1.27.91/libnm/nm-dns-manager.c Examining data/network-manager-1.27.91/libnm/nm-device-team.c Examining data/network-manager-1.27.91/libnm/nm-ip6-config.c Examining data/network-manager-1.27.91/libnm/nm-device-wimax.h Examining data/network-manager-1.27.91/libnm/nm-device-macsec.c Examining data/network-manager-1.27.91/libnm/nm-object.c Examining data/network-manager-1.27.91/libnm/nm-checkpoint.c Examining data/network-manager-1.27.91/libnm/nm-vpn-plugin-old.h Examining data/network-manager-1.27.91/libnm/nm-dhcp-config.h Examining data/network-manager-1.27.91/libnm/nm-active-connection.c Examining data/network-manager-1.27.91/libnm/nm-device-wifi.h Examining data/network-manager-1.27.91/libnm/nm-types.h Examining data/network-manager-1.27.91/libnm/nm-dbus-helpers.h Examining data/network-manager-1.27.91/libnm/nm-device-modem.h Examining data/network-manager-1.27.91/libnm/nm-dhcp4-config.h Examining data/network-manager-1.27.91/libnm/nm-device-modem.c Examining data/network-manager-1.27.91/libnm/nm-device-ip-tunnel.h Examining data/network-manager-1.27.91/libnm/nm-device-wifi.c Examining data/network-manager-1.27.91/libnm/nm-wimax-nsp.c Examining data/network-manager-1.27.91/libnm/nm-device-bridge.h Examining data/network-manager-1.27.91/libnm/nm-checkpoint.h Examining data/network-manager-1.27.91/libnm/nm-device-vxlan.c Examining data/network-manager-1.27.91/libnm/nm-device-macvlan.c Examining data/network-manager-1.27.91/libnm/nm-device-bond.h Examining data/network-manager-1.27.91/libnm/nm-device-macvlan.h Examining data/network-manager-1.27.91/libnm/nm-device-bt.h Examining data/network-manager-1.27.91/libnm/nm-device-wifi-p2p.h Examining data/network-manager-1.27.91/libnm/nm-device-tun.c Examining data/network-manager-1.27.91/libnm/nm-client.h Examining data/network-manager-1.27.91/libnm/nm-device-6lowpan.h Examining data/network-manager-1.27.91/libnm/nm-device-ovs-interface.h Examining data/network-manager-1.27.91/libnm/nm-dhcp4-config.c Examining data/network-manager-1.27.91/libnm/nm-device-adsl.h Examining data/network-manager-1.27.91/libnm/nm-dhcp-config.c Examining data/network-manager-1.27.91/libnm/nm-remote-connection.h Examining data/network-manager-1.27.91/libnm/nm-device-ovs-bridge.c Examining data/network-manager-1.27.91/libnm/nm-device-bond.c Examining data/network-manager-1.27.91/libnm/nm-active-connection.h Examining data/network-manager-1.27.91/libnm/nm-remote-connection-private.h Examining data/network-manager-1.27.91/libnm/nm-vpn-editor.c Examining data/network-manager-1.27.91/libnm/tests/test-libnm.c Examining data/network-manager-1.27.91/libnm/tests/test-remote-settings-client.c Examining data/network-manager-1.27.91/libnm/tests/test-secret-agent.c Examining data/network-manager-1.27.91/libnm/tests/test-nm-client.c Examining data/network-manager-1.27.91/libnm/nm-ip6-config.h Examining data/network-manager-1.27.91/libnm/nm-device-wpan.h Examining data/network-manager-1.27.91/libnm/nm-device.c Examining data/network-manager-1.27.91/libnm/nm-vpn-connection.h Examining data/network-manager-1.27.91/libnm/nm-autoptr.h Examining data/network-manager-1.27.91/libnm/nm-device-bridge.c Examining data/network-manager-1.27.91/libnm/nm-device-vlan.h Examining data/network-manager-1.27.91/libnm/nm-wifi-p2p-peer.h Examining data/network-manager-1.27.91/libnm/nm-remote-connection.c Examining data/network-manager-1.27.91/libnm/nm-ip-config.c Examining data/network-manager-1.27.91/libnm/nm-access-point.c Examining data/network-manager-1.27.91/libnm/nm-libnm-utils.h Examining data/network-manager-1.27.91/examples/C/glib/monitor-nm-running-gdbus.c Examining data/network-manager-1.27.91/examples/C/glib/list-connections-gdbus.c Examining data/network-manager-1.27.91/examples/C/glib/get-active-connections-gdbus.c Examining data/network-manager-1.27.91/examples/C/glib/add-connection-gdbus.c Examining data/network-manager-1.27.91/examples/C/glib/get-ap-info-libnm.c Examining data/network-manager-1.27.91/examples/C/glib/monitor-nm-state-gdbus.c Examining data/network-manager-1.27.91/examples/C/glib/add-connection-libnm.c Examining data/network-manager-1.27.91/examples/C/glib/list-connections-libnm.c Examining data/network-manager-1.27.91/examples/C/qt/change-ipv4-addresses.cpp Examining data/network-manager-1.27.91/examples/C/qt/monitor-nm-running.cpp Examining data/network-manager-1.27.91/examples/C/qt/list-connections.cpp Examining data/network-manager-1.27.91/examples/C/qt/add-connection-wired.cpp Examining data/network-manager-1.27.91/libnm-core/nm-setting-cdma.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireless-security.h Examining data/network-manager-1.27.91/libnm-core/nm-utils.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireless.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-bond.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-wired.c Examining data/network-manager-1.27.91/libnm-core/nm-connection-private.h Examining data/network-manager-1.27.91/libnm-core/nm-crypto.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-dcb.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-match.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-proxy.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip-tunnel.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-vxlan.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireless-security.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-adsl.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wifi-p2p.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-team-port.h Examining data/network-manager-1.27.91/libnm-core/nm-vpn-plugin-info.h Examining data/network-manager-1.27.91/libnm-core/nm-property-compare.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-user.h Examining data/network-manager-1.27.91/libnm-core/nm-dbus-utils.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-dcb.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-user.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-pppoe.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-dummy.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-wired.h Examining data/network-manager-1.27.91/libnm-core/nm-property-compare.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-bluetooth.c Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-ethtool-utils.h Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-ethtool-utils.c Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-auth-subject.h Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-common-macros.h Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.h Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-auth-subject.c Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.c Examining data/network-manager-1.27.91/libnm-core/nm-vpn-plugin-info.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-bridge.c Examining data/network-manager-1.27.91/libnm-core/nm-team-utils.h Examining data/network-manager-1.27.91/libnm-core/nm-vpn-editor-plugin.h Examining data/network-manager-1.27.91/libnm-core/nm-connection.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wifi-p2p.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-infiniband.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-vlan.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-macvlan.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-cdma.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wpan.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-generic.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-olpc-mesh.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-serial.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-patch.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ethtool.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-port.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip6-config.c Examining data/network-manager-1.27.91/libnm-core/nm-dbus-interface.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-bridge-port.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-macsec.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-match.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-bond.c Examining data/network-manager-1.27.91/libnm-core/nm-errors.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-bridge-port.h Examining data/network-manager-1.27.91/libnm-core/nm-vpn-dbus-interface.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-gsm.h Examining data/network-manager-1.27.91/libnm-core/nm-utils-private.h Examining data/network-manager-1.27.91/libnm-core/nm-version.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-gsm.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-interface.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ethtool.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-bridge.h Examining data/network-manager-1.27.91/libnm-core/nm-simple-connection.c Examining data/network-manager-1.27.91/libnm-core/nm-crypto-nss.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c Examining data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c Examining data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c Examining data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-internal.h Examining data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip-tunnel.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-proxy.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-8021x.h Examining data/network-manager-1.27.91/libnm-core/nm-core-internal.h Examining data/network-manager-1.27.91/libnm-core/nm-crypto-gnutls.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-olpc-mesh.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-bridge.c Examining data/network-manager-1.27.91/libnm-core/nm-setting.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-dummy.c Examining data/network-manager-1.27.91/libnm-core/nm-utils.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-port.h Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-libnm-core-aux.c Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-dispatcher-api.h Examining data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-libnm-core-aux.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-patch.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-vrf.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-dpdk.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip6-config.h Examining data/network-manager-1.27.91/libnm-core/nm-connection.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-wimax.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-pppoe.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wpan.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-vpn.c Examining data/network-manager-1.27.91/libnm-core/nm-setting.h Examining data/network-manager-1.27.91/libnm-core/nm-crypto-impl.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-sriov.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-bluetooth.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-vpn.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-tc-config.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-private.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-adsl.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-sriov.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-team-port.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wimax.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-connection.h Examining data/network-manager-1.27.91/libnm-core/nm-core-types.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-vxlan.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-vlan.c Examining data/network-manager-1.27.91/libnm-core/nm-crypto.h Examining data/network-manager-1.27.91/libnm-core/nm-simple-connection.h Examining data/network-manager-1.27.91/libnm-core/nm-team-utils.c Examining data/network-manager-1.27.91/libnm-core/nm-vpn-editor-plugin.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-tun.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-serial.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ppp.h Examining data/network-manager-1.27.91/libnm-core/nm-errors.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-vrf.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-tc-config.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-team.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-connection.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-interface.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-infiniband.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-6lowpan.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-wireless.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-macsec.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip4-config.c Examining data/network-manager-1.27.91/libnm-core/tests/test-compare.c Examining data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c Examining data/network-manager-1.27.91/libnm-core/tests/test-general.c Examining data/network-manager-1.27.91/libnm-core/tests/test-settings-defaults.c Examining data/network-manager-1.27.91/libnm-core/tests/test-setting.c Examining data/network-manager-1.27.91/libnm-core/tests/test-secrets.c Examining data/network-manager-1.27.91/libnm-core/tests/test-general-enums.h Examining data/network-manager-1.27.91/libnm-core/tests/test-crypto.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-macvlan.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-bridge.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-team.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip4-config.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ovs-dpdk.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-tun.c Examining data/network-manager-1.27.91/libnm-core/nm-core-types-internal.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ppp.c Examining data/network-manager-1.27.91/libnm-core/nm-setting-generic.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-6lowpan.h Examining data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c Examining data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c Examining data/network-manager-1.27.91/clients/common/settings-docs.h Examining data/network-manager-1.27.91/clients/common/qrcodegen.c Examining data/network-manager-1.27.91/clients/common/nm-client-utils.c Examining data/network-manager-1.27.91/clients/common/nm-vpn-helpers.h Examining data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c Examining data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c Examining data/network-manager-1.27.91/clients/common/qrcodegen.h Examining data/network-manager-1.27.91/clients/common/nm-polkit-listener.h Examining data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c Examining data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.h Examining data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.h Examining data/network-manager-1.27.91/clients/common/nm-polkit-listener.c Examining data/network-manager-1.27.91/clients/common/tests/test-libnm-core-aux.c Examining data/network-manager-1.27.91/clients/common/tests/test-clients-common.c Examining data/network-manager-1.27.91/clients/common/nm-client-utils.h Examining data/network-manager-1.27.91/clients/common/nm-meta-setting-access.h Examining data/network-manager-1.27.91/clients/cloud-setup/nm-http-client.c Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.h Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.h Examining data/network-manager-1.27.91/clients/cloud-setup/nm-http-client.h Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider.h Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.c Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.h Examining data/network-manager-1.27.91/clients/cloud-setup/nm-cloud-setup-utils.c Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c Examining data/network-manager-1.27.91/clients/cloud-setup/main.c Examining data/network-manager-1.27.91/clients/cloud-setup/nm-cloud-setup-utils.h Examining data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider.c Examining data/network-manager-1.27.91/clients/cli/connections.c Examining data/network-manager-1.27.91/clients/cli/generate-docs-nm-settings-nmcli.c Examining data/network-manager-1.27.91/clients/cli/utils.h Examining data/network-manager-1.27.91/clients/cli/settings.h Examining data/network-manager-1.27.91/clients/cli/common.h Examining data/network-manager-1.27.91/clients/cli/connections.h Examining data/network-manager-1.27.91/clients/cli/agent.c Examining data/network-manager-1.27.91/clients/cli/nmcli.h Examining data/network-manager-1.27.91/clients/cli/nmcli.c Examining data/network-manager-1.27.91/clients/cli/utils.c Examining data/network-manager-1.27.91/clients/cli/polkit-agent.c Examining data/network-manager-1.27.91/clients/cli/common.c Examining data/network-manager-1.27.91/clients/cli/devices.h Examining data/network-manager-1.27.91/clients/cli/settings.c Examining data/network-manager-1.27.91/clients/cli/devices.c Examining data/network-manager-1.27.91/clients/cli/polkit-agent.h Examining data/network-manager-1.27.91/clients/cli/general.c Examining data/network-manager-1.27.91/clients/nm-online.c Examining data/network-manager-1.27.91/clients/tui/nmt-edit-connection-list.h Examining data/network-manager-1.27.91/clients/tui/nmtui-edit.c Examining data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-bridge.h Examining data/network-manager-1.27.91/clients/tui/nmt-mac-entry.c Examining data/network-manager-1.27.91/clients/tui/nmtui-connect.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-vlan.h Examining data/network-manager-1.27.91/clients/tui/nmt-route-table.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-dsl.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-bond.h Examining data/network-manager-1.27.91/clients/tui/nmtui-hostname.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip-tunnel.c Examining data/network-manager-1.27.91/clients/tui/nmt-device-entry.h Examining data/network-manager-1.27.91/clients/tui/nmtui-hostname.c Examining data/network-manager-1.27.91/clients/tui/nmt-route-entry.c Examining data/network-manager-1.27.91/clients/tui/nm-editor-utils.c Examining data/network-manager-1.27.91/clients/tui/nmt-editor-page.c Examining data/network-manager-1.27.91/clients/tui/nmt-slave-list.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-team.h Examining data/network-manager-1.27.91/clients/tui/nmt-password-dialog.c Examining data/network-manager-1.27.91/clients/tui/nmt-editor-section.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip6.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-ethernet.c Examining data/network-manager-1.27.91/clients/tui/nmt-slave-list.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-vlan.c Examining data/network-manager-1.27.91/clients/tui/nmt-editor-section.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-infiniband.c Examining data/network-manager-1.27.91/clients/tui/nmt-editor-page-device.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-ppp.c Examining data/network-manager-1.27.91/clients/tui/nm-editor-utils.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-ppp.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-bond.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-wifi.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip4.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-dsl.h Examining data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-button.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-popup.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-checkbox.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-separator.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-separator.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-stack.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-utils.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-textbox.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-toggle-button.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-listbox.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-form.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-hacks.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-widget.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-widget.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-button-box.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-popup.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-grid.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-toggle-button.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-component.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-label.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-container.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-checkbox.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-listbox.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-hacks.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-textbox.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-component.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-stack.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-utils.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-button.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-container.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-button-box.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry-numeric.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-label.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry-numeric.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-form.c Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-types.h Examining data/network-manager-1.27.91/clients/tui/newt/nmt-newt-grid.h Examining data/network-manager-1.27.91/clients/tui/nmt-widget-list.h Examining data/network-manager-1.27.91/clients/tui/nmt-address-list.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-team-port.h Examining data/network-manager-1.27.91/clients/tui/nmt-mtu-entry.c Examining data/network-manager-1.27.91/clients/tui/nmt-route-entry.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-infiniband.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-bridge-port.c Examining data/network-manager-1.27.91/clients/tui/nmtui.c Examining data/network-manager-1.27.91/clients/tui/nmt-editor-page-device.c Examining data/network-manager-1.27.91/clients/tui/nmt-editor-grid.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-team.c Examining data/network-manager-1.27.91/clients/tui/nmt-utils.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip6.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-wifi.c Examining data/network-manager-1.27.91/clients/tui/nmt-address-list.c Examining data/network-manager-1.27.91/clients/tui/nmt-utils.c Examining data/network-manager-1.27.91/clients/tui/nmt-device-entry.c Examining data/network-manager-1.27.91/clients/tui/nmt-password-dialog.h Examining data/network-manager-1.27.91/clients/tui/nmtui-edit.h Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip4.h Examining data/network-manager-1.27.91/clients/tui/nmtui.h Examining data/network-manager-1.27.91/clients/tui/nmt-password-fields.c Examining data/network-manager-1.27.91/clients/tui/nmt-editor.h Examining data/network-manager-1.27.91/clients/tui/nmt-editor.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-bridge.c Examining data/network-manager-1.27.91/clients/tui/nmt-mac-entry.h Examining data/network-manager-1.27.91/clients/tui/nmt-editor-grid.c Examining data/network-manager-1.27.91/clients/tui/nmt-editor-page.h Examining data/network-manager-1.27.91/clients/tui/nmt-route-editor.h Examining data/network-manager-1.27.91/clients/tui/nm-editor-bindings.c Examining data/network-manager-1.27.91/clients/tui/nmt-widget-list.c Examining data/network-manager-1.27.91/clients/tui/nmtui-connect.c Examining data/network-manager-1.27.91/clients/tui/nmt-ip-entry.c Examining data/network-manager-1.27.91/clients/tui/nmt-password-fields.h Examining data/network-manager-1.27.91/clients/tui/nmt-edit-connection-list.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-ethernet.h Examining data/network-manager-1.27.91/clients/tui/nmt-ip-entry.h Examining data/network-manager-1.27.91/clients/tui/nmt-route-editor.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-bridge-port.h Examining data/network-manager-1.27.91/clients/tui/nmt-route-table.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-team-port.c Examining data/network-manager-1.27.91/clients/tui/nmt-page-ip-tunnel.h Examining data/network-manager-1.27.91/clients/tui/nm-editor-bindings.h Examining data/network-manager-1.27.91/clients/tui/nmt-mtu-entry.h Examining data/network-manager-1.27.91/src/dns/nm-dns-systemd-resolved.h Examining data/network-manager-1.27.91/src/dns/nm-dns-unbound.c Examining data/network-manager-1.27.91/src/dns/nm-dns-plugin.c Examining data/network-manager-1.27.91/src/dns/nm-dns-unbound.h Examining data/network-manager-1.27.91/src/dns/nm-dns-manager.c Examining data/network-manager-1.27.91/src/dns/nm-dns-plugin.h Examining data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c Examining data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.h Examining data/network-manager-1.27.91/src/dns/nm-dns-systemd-resolved.c Examining data/network-manager-1.27.91/src/dns/nm-dns-manager.h Examining data/network-manager-1.27.91/src/nm-auth-manager.h Examining data/network-manager-1.27.91/src/nm-auth-utils.h Examining data/network-manager-1.27.91/src/nm-dispatcher.h Examining data/network-manager-1.27.91/src/nm-config.h Examining data/network-manager-1.27.91/src/nm-proxy-config.h Examining data/network-manager-1.27.91/src/settings/nm-settings-storage.h Examining data/network-manager-1.27.91/src/settings/nm-settings-storage.c Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-storage.h Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.h Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.h Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-plugin.c Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-plugin.h Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-common.h Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.h Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-storage.c Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c Examining data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.h Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-reader.h Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-reader.c Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.h Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-writer.c Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-storage.c Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.c Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.h Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-writer.h Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c Examining data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-storage.h Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-plugin.c Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-plugin.h Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.h Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.h Examining data/network-manager-1.27.91/src/settings/plugins/ifupdown/tests/test-ifupdown.c Examining data/network-manager-1.27.91/src/settings/nm-settings-plugin.h Examining data/network-manager-1.27.91/src/settings/nm-settings.h Examining data/network-manager-1.27.91/src/settings/nm-settings-connection.c Examining data/network-manager-1.27.91/src/settings/nm-settings-utils.c Examining data/network-manager-1.27.91/src/settings/nm-secret-agent.c Examining data/network-manager-1.27.91/src/settings/nm-settings-connection.h Examining data/network-manager-1.27.91/src/settings/nm-secret-agent.h Examining data/network-manager-1.27.91/src/settings/nm-agent-manager.c Examining data/network-manager-1.27.91/src/settings/nm-agent-manager.h Examining data/network-manager-1.27.91/src/settings/nm-settings-utils.h Examining data/network-manager-1.27.91/src/settings/nm-settings-plugin.c Examining data/network-manager-1.27.91/src/settings/nm-settings.c Examining data/network-manager-1.27.91/src/nm-firewall-manager.c Examining data/network-manager-1.27.91/src/nm-netns.h Examining data/network-manager-1.27.91/src/nm-ip4-config.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-listener.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhcpcanon.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-client-logging.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-manager.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-manager.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-options.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-listener.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper-api.h Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhcpcd.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper.c Examining data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-dhclient.c Examining data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c Examining data/network-manager-1.27.91/src/dhcp/nm-dhcp-options.c Examining data/network-manager-1.27.91/src/nm-ip4-config.c Examining data/network-manager-1.27.91/src/initrd/nm-initrd-generator.h Examining data/network-manager-1.27.91/src/initrd/nm-initrd-generator.c Examining data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c Examining data/network-manager-1.27.91/src/initrd/nmi-dt-reader.c Examining data/network-manager-1.27.91/src/initrd/tests/test-dt-reader.c Examining data/network-manager-1.27.91/src/initrd/tests/test-cmdline-reader.c Examining data/network-manager-1.27.91/src/initrd/tests/test-ibft-reader.c Examining data/network-manager-1.27.91/src/initrd/nmi-ibft-reader.c Examining data/network-manager-1.27.91/src/nm-hostname-manager.h Examining data/network-manager-1.27.91/src/nm-dbus-utils.c Examining data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c Examining data/network-manager-1.27.91/src/vpn/nm-vpn-manager.h Examining data/network-manager-1.27.91/src/vpn/nm-vpn-manager.c Examining data/network-manager-1.27.91/src/vpn/nm-vpn-connection.h Examining data/network-manager-1.27.91/src/nm-audit-manager.h Examining data/network-manager-1.27.91/src/nm-core-utils.c Examining data/network-manager-1.27.91/src/nm-auth-utils.c Examining data/network-manager-1.27.91/src/nm-dbus-object.h Examining data/network-manager-1.27.91/src/main-utils.h Examining data/network-manager-1.27.91/src/nm-connectivity.h Examining data/network-manager-1.27.91/src/nm-pacrunner-manager.c Examining data/network-manager-1.27.91/src/nm-config.c Examining data/network-manager-1.27.91/src/nm-rfkill-manager.h Examining data/network-manager-1.27.91/src/platform/linux/nl802154.h Examining data/network-manager-1.27.91/src/platform/nm-fake-platform.c Examining data/network-manager-1.27.91/src/platform/nm-netlink.c Examining data/network-manager-1.27.91/src/platform/nmp-rules-manager.h Examining data/network-manager-1.27.91/src/platform/nm-fake-platform.h Examining data/network-manager-1.27.91/src/platform/nm-linux-platform.h Examining data/network-manager-1.27.91/src/platform/nm-platform.h Examining data/network-manager-1.27.91/src/platform/nm-platform.c Examining data/network-manager-1.27.91/src/platform/nmp-netns.h Examining data/network-manager-1.27.91/src/platform/nmp-rules-manager.c Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils.c Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.h Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils.h Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-private.h Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c Examining data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.h Examining data/network-manager-1.27.91/src/platform/nm-netlink.h Examining data/network-manager-1.27.91/src/platform/nmp-object.c Examining data/network-manager-1.27.91/src/platform/nm-linux-platform.c Examining data/network-manager-1.27.91/src/platform/nm-platform-utils.c Examining data/network-manager-1.27.91/src/platform/nmp-netns.c Examining data/network-manager-1.27.91/src/platform/nm-platform-utils.h Examining data/network-manager-1.27.91/src/platform/tests/test-common.h Examining data/network-manager-1.27.91/src/platform/tests/test-platform-general.c Examining data/network-manager-1.27.91/src/platform/tests/test-nmp-object.c Examining data/network-manager-1.27.91/src/platform/tests/test-address.c Examining data/network-manager-1.27.91/src/platform/tests/test-cleanup.c Examining data/network-manager-1.27.91/src/platform/tests/monitor.c Examining data/network-manager-1.27.91/src/platform/tests/test-link.c Examining data/network-manager-1.27.91/src/platform/tests/test-route.c Examining data/network-manager-1.27.91/src/platform/tests/test-common.c Examining data/network-manager-1.27.91/src/platform/tests/test-tc.c Examining data/network-manager-1.27.91/src/platform/nm-platform-private.h Examining data/network-manager-1.27.91/src/platform/nmp-object.h Examining data/network-manager-1.27.91/src/platform/wpan/nm-wpan-utils.h Examining data/network-manager-1.27.91/src/platform/wpan/nm-wpan-utils.c Examining data/network-manager-1.27.91/src/nm-session-monitor.h Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.h Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-interface.h Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-interface.c Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.h Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-settings-verify.c Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-types.h Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-settings-verify.h Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c Examining data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c Examining data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.c Examining data/network-manager-1.27.91/src/nm-rfkill-manager.c Examining data/network-manager-1.27.91/src/nm-ip-config.h Examining data/network-manager-1.27.91/src/nm-policy.c Examining data/network-manager-1.27.91/src/nm-pacrunner-manager.h Examining data/network-manager-1.27.91/src/nm-proxy-config.c Examining data/network-manager-1.27.91/src/nm-connectivity.c Examining data/network-manager-1.27.91/src/nm-logging.c Examining data/network-manager-1.27.91/src/nm-dbus-manager.c Examining data/network-manager-1.27.91/src/nm-l3cfg.h Examining data/network-manager-1.27.91/src/nm-l3-config-data.h Examining data/network-manager-1.27.91/src/nm-ip6-config.c Examining data/network-manager-1.27.91/src/nm-dbus-object.c Examining data/network-manager-1.27.91/src/nm-policy.h Examining data/network-manager-1.27.91/src/nm-act-request.h Examining data/network-manager-1.27.91/src/nm-audit-manager.c Examining data/network-manager-1.27.91/src/nm-dcb.h Examining data/network-manager-1.27.91/src/nm-sleep-monitor.c Examining data/network-manager-1.27.91/src/nm-checkpoint.c Examining data/network-manager-1.27.91/src/nm-hostname-manager.c Examining data/network-manager-1.27.91/src/nm-dispatcher.c Examining data/network-manager-1.27.91/src/nm-dhcp-config.h Examining data/network-manager-1.27.91/src/nm-active-connection.c Examining data/network-manager-1.27.91/src/nm-test-utils-core.h Examining data/network-manager-1.27.91/src/nm-sleep-monitor.h Examining data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c Examining data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-utils.c Examining data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.h Examining data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-utils.h Examining data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c Examining data/network-manager-1.27.91/src/nm-types.h Examining data/network-manager-1.27.91/src/nm-checkpoint-manager.h Examining data/network-manager-1.27.91/src/nm-config-data.h Examining data/network-manager-1.27.91/src/nm-firewall-manager.h Examining data/network-manager-1.27.91/src/ppp/nm-ppp-status.h Examining data/network-manager-1.27.91/src/ppp/nm-ppp-manager.h Examining data/network-manager-1.27.91/src/ppp/nm-pppd-plugin.c Examining data/network-manager-1.27.91/src/ppp/nm-ppp-manager.c Examining data/network-manager-1.27.91/src/ppp/nm-ppp-manager-call.c Examining data/network-manager-1.27.91/src/ppp/nm-pppd-plugin.h Examining data/network-manager-1.27.91/src/ppp/nm-ppp-plugin-api.h Examining data/network-manager-1.27.91/src/ppp/nm-ppp-manager-call.h Examining data/network-manager-1.27.91/src/nm-logging.h Examining data/network-manager-1.27.91/src/nm-manager.h Examining data/network-manager-1.27.91/src/nm-checkpoint.h Examining data/network-manager-1.27.91/src/nm-keep-alive.c Examining data/network-manager-1.27.91/src/nm-keep-alive.h Examining data/network-manager-1.27.91/src/nm-auth-manager.c Examining data/network-manager-1.27.91/src/nm-dhcp-config.c Examining data/network-manager-1.27.91/src/nm-act-request.c Examining data/network-manager-1.27.91/src/nm-l3-config-data.c Examining data/network-manager-1.27.91/src/devices/nm-device-generic.c Examining data/network-manager-1.27.91/src/devices/nm-device-ip-tunnel.c Examining data/network-manager-1.27.91/src/devices/nm-device-infiniband.c Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-port.h Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-bridge.h Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-interface.c Examining data/network-manager-1.27.91/src/devices/ovs/nm-ovs-factory.c Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-port.c Examining data/network-manager-1.27.91/src/devices/ovs/nm-ovsdb.h Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-interface.h Examining data/network-manager-1.27.91/src/devices/ovs/nm-device-ovs-bridge.c Examining data/network-manager-1.27.91/src/devices/ovs/nm-ovsdb.c Examining data/network-manager-1.27.91/src/devices/nm-device-infiniband.h Examining data/network-manager-1.27.91/src/devices/nm-device-wpan.c Examining data/network-manager-1.27.91/src/devices/wwan/nm-wwan-factory.c Examining data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.c Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-ofono.c Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-manager.c Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-ofono.h Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-manager.h Examining data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.h Examining data/network-manager-1.27.91/src/devices/wwan/nm-device-modem.h Examining data/network-manager-1.27.91/src/devices/wwan/nm-device-modem.c Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-broadband.h Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem.h Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem.c Examining data/network-manager-1.27.91/src/devices/wwan/tests/test-service-providers.c Examining data/network-manager-1.27.91/src/devices/wwan/nm-modem-broadband.c Examining data/network-manager-1.27.91/src/devices/nm-device-6lowpan.c Examining data/network-manager-1.27.91/src/devices/nm-device-logging.h Examining data/network-manager-1.27.91/src/devices/nm-device-factory.h Examining data/network-manager-1.27.91/src/devices/nm-device.h Examining data/network-manager-1.27.91/src/devices/nm-device-vrf.c Examining data/network-manager-1.27.91/src/devices/nm-device-vrf.h Examining data/network-manager-1.27.91/src/devices/nm-device-ethernet.c Examining data/network-manager-1.27.91/src/devices/nm-device-wireguard.c Examining data/network-manager-1.27.91/src/devices/nm-device-vlan.c Examining data/network-manager-1.27.91/src/devices/nm-device-veth.c Examining data/network-manager-1.27.91/src/devices/nm-device-ppp.c Examining data/network-manager-1.27.91/src/devices/nm-device-ethernet.h Examining data/network-manager-1.27.91/src/devices/nm-device-tun.h Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.h Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-device-bt.c Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bt-error.c Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-common.h Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bt-error.h Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-device-bt.h Examining data/network-manager-1.27.91/src/devices/bluetooth/tests/nm-bt-test.c Examining data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.h Examining data/network-manager-1.27.91/src/devices/nm-device-vxlan.h Examining data/network-manager-1.27.91/src/devices/nm-device-wireguard.h Examining data/network-manager-1.27.91/src/devices/nm-device-dummy.c Examining data/network-manager-1.27.91/src/devices/nm-device-macsec.h Examining data/network-manager-1.27.91/src/devices/nm-device-generic.h Examining data/network-manager-1.27.91/src/devices/nm-device-private.h Examining data/network-manager-1.27.91/src/devices/nm-device-ppp.h Examining data/network-manager-1.27.91/src/devices/nm-device-dummy.h Examining data/network-manager-1.27.91/src/devices/nm-lldp-listener.h Examining data/network-manager-1.27.91/src/devices/nm-device-macsec.c Examining data/network-manager-1.27.91/src/devices/adsl/nm-device-adsl.c Examining data/network-manager-1.27.91/src/devices/adsl/nm-atm-manager.c Examining data/network-manager-1.27.91/src/devices/adsl/nm-device-adsl.h Examining data/network-manager-1.27.91/src/devices/nm-device-ethernet-utils.h Examining data/network-manager-1.27.91/src/devices/nm-device-ip-tunnel.h Examining data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi-p2p.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-utils.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.h Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-p2p-peer.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-common.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-olpc-mesh.h Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-utils.h Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-ap.h Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-common.h Examining data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.h Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-olpc-mesh.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-factory.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.h Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-ap.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi-p2p.h Examining data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.c Examining data/network-manager-1.27.91/src/devices/wifi/nm-wifi-p2p-peer.h Examining data/network-manager-1.27.91/src/devices/nm-acd-manager.c Examining data/network-manager-1.27.91/src/devices/nm-device-bridge.h Examining data/network-manager-1.27.91/src/devices/nm-device-vxlan.c Examining data/network-manager-1.27.91/src/devices/nm-device-macvlan.c Examining data/network-manager-1.27.91/src/devices/nm-acd-manager.h Examining data/network-manager-1.27.91/src/devices/nm-device-bond.h Examining data/network-manager-1.27.91/src/devices/nm-device-macvlan.h Examining data/network-manager-1.27.91/src/devices/nm-device-factory.c Examining data/network-manager-1.27.91/src/devices/nm-device-tun.c Examining data/network-manager-1.27.91/src/devices/nm-device-6lowpan.h Examining data/network-manager-1.27.91/src/devices/nm-device-veth.h Examining data/network-manager-1.27.91/src/devices/nm-device-bond.c Examining data/network-manager-1.27.91/src/devices/nm-lldp-listener.c Examining data/network-manager-1.27.91/src/devices/tests/test-lldp.c Examining data/network-manager-1.27.91/src/devices/tests/test-acd.c Examining data/network-manager-1.27.91/src/devices/nm-device-wpan.h Examining data/network-manager-1.27.91/src/devices/nm-device.c Examining data/network-manager-1.27.91/src/devices/nm-device-bridge.c Examining data/network-manager-1.27.91/src/devices/team/nm-device-team.h Examining data/network-manager-1.27.91/src/devices/team/nm-device-team.c Examining data/network-manager-1.27.91/src/devices/team/nm-team-factory.c Examining data/network-manager-1.27.91/src/devices/nm-device-ethernet-utils.c Examining data/network-manager-1.27.91/src/devices/nm-device-vlan.h Examining data/network-manager-1.27.91/src/nm-active-connection.h Examining data/network-manager-1.27.91/src/NetworkManagerUtils.h Examining data/network-manager-1.27.91/src/nm-l3cfg.c Examining data/network-manager-1.27.91/src/NetworkManagerUtils.c Examining data/network-manager-1.27.91/src/nm-config-data.c Examining data/network-manager-1.27.91/src/nm-netns.c Examining data/network-manager-1.27.91/src/main.c Examining data/network-manager-1.27.91/src/tests/test-dcb.c Examining data/network-manager-1.27.91/src/tests/config/nm-test-device.h Examining data/network-manager-1.27.91/src/tests/config/nm-test-device.c Examining data/network-manager-1.27.91/src/tests/config/test-config.c Examining data/network-manager-1.27.91/src/tests/test-utils.c Examining data/network-manager-1.27.91/src/tests/test-ip6-config.c Examining data/network-manager-1.27.91/src/tests/test-ip4-config.c Examining data/network-manager-1.27.91/src/tests/test-core-with-expect.c Examining data/network-manager-1.27.91/src/tests/test-systemd.c Examining data/network-manager-1.27.91/src/tests/test-l3cfg.c Examining data/network-manager-1.27.91/src/tests/test-core.c Examining data/network-manager-1.27.91/src/tests/test-wired-defname.c Examining data/network-manager-1.27.91/src/nm-ip6-config.h Examining data/network-manager-1.27.91/src/ndisc/nm-ndisc.h Examining data/network-manager-1.27.91/src/ndisc/nm-ndisc.c Examining data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c Examining data/network-manager-1.27.91/src/ndisc/nm-ndisc-private.h Examining data/network-manager-1.27.91/src/ndisc/nm-fake-ndisc.h Examining data/network-manager-1.27.91/src/ndisc/nm-fake-ndisc.c Examining data/network-manager-1.27.91/src/ndisc/tests/test-ndisc-linux.c Examining data/network-manager-1.27.91/src/ndisc/tests/test-ndisc-fake.c Examining data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.h Examining data/network-manager-1.27.91/src/nm-dbus-utils.h Examining data/network-manager-1.27.91/src/nm-checkpoint-manager.c Examining data/network-manager-1.27.91/src/main-utils.c Examining data/network-manager-1.27.91/src/nm-ip-config.c Examining data/network-manager-1.27.91/src/nm-iface-helper.c Examining data/network-manager-1.27.91/src/nm-session-monitor.c Examining data/network-manager-1.27.91/src/systemd/nm-sd.h Examining data/network-manager-1.27.91/src/systemd/nm-sd.c Examining data/network-manager-1.27.91/src/systemd/nm-sd-utils-dhcp.c Examining data/network-manager-1.27.91/src/systemd/nm-sd-utils-core.c Examining data/network-manager-1.27.91/src/systemd/nm-sd-utils-dhcp.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/condition.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/khash.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/device-util.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/sd-device.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/udev-util.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/nm-sd-adapt-core.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/sd-daemon.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/conf-parser.h Examining data/network-manager-1.27.91/src/systemd/sd-adapt-core/nm-sd-adapt-core.c Examining data/network-manager-1.27.91/src/systemd/nm-sd-utils-core.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-protocol.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-lease-internal.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-ipv4acd.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-protocol.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-ipv4ll.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-network.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-packet.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-lease.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-lease-internal.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-internal.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-internal.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-network.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-lldp.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-network.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-internal.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-network.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/event-util.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/event-source.h Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/event-util.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/sd-id128.c Examining data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-ipv4ll.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-id128.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-event.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp6-client.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-ipv4acd.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp6-lease.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp-option.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-ndisc.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp-client.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/_sd-common.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp-lease.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-lldp.h Examining data/network-manager-1.27.91/src/systemd/src/systemd/sd-dhcp6-option.h Examining data/network-manager-1.27.91/src/nm-dbus-manager.h Examining data/network-manager-1.27.91/src/nm-core-utils.h Examining data/network-manager-1.27.91/src/nm-dcb.c Examining data/network-manager-1.27.91/src/nm-manager.c Examining data/network-manager-1.27.91/shared/nm-default.h Examining data/network-manager-1.27.91/shared/nm-udev-aux/nm-udev-utils.c Examining data/network-manager-1.27.91/shared/nm-udev-aux/nm-udev-utils.h Examining data/network-manager-1.27.91/shared/c-siphash/src/c-siphash.h Examining data/network-manager-1.27.91/shared/c-siphash/src/c-siphash.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-glib.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-ref-string.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-enum-utils.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-random-utils.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-dedup-multi.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-enum-utils.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-errno.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-errno.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-logging-base.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-time-utils.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-logging-base.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-dbus-aux.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-jansson.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-logging-fwd.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-random-utils.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-value-type.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-ref-string.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-obj.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-c-list.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-dbus-aux.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-json-aux.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-time-utils.h Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.c Examining data/network-manager-1.27.91/shared/nm-glib-aux/nm-dedup-multi.c Examining data/network-manager-1.27.91/shared/nm-test-libnm-utils.h Examining data/network-manager-1.27.91/shared/nm-version-macros.h Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-probe.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-private.h Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-outgoing.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.h Examining data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.h Examining data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-incoming.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-lease.c Examining data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4.h Examining data/network-manager-1.27.91/shared/nm-meta-setting.c Examining data/network-manager-1.27.91/shared/c-rbtree/src/c-rbtree.c Examining data/network-manager-1.27.91/shared/c-rbtree/src/c-rbtree-private.h Examining data/network-manager-1.27.91/shared/c-rbtree/src/c-rbtree.h Examining data/network-manager-1.27.91/shared/c-list/src/c-list.h Examining data/network-manager-1.27.91/shared/nm-utils/nm-vpn-plugin-utils.c Examining data/network-manager-1.27.91/shared/nm-utils/nm-compat.c Examining data/network-manager-1.27.91/shared/nm-utils/nm-compat.h Examining data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h Examining data/network-manager-1.27.91/shared/nm-utils/nm-vpn-plugin-utils.h Examining data/network-manager-1.27.91/shared/nm-utils/nm-vpn-plugin-macros.h Examining data/network-manager-1.27.91/shared/nm-utils/nm-vpn-editor-plugin-call.h Examining data/network-manager-1.27.91/shared/c-stdaux/src/c-stdaux.h Examining data/network-manager-1.27.91/shared/nm-std-aux/nm-dbus-compat.h Examining data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h Examining data/network-manager-1.27.91/shared/nm-std-aux/c-list-util.c Examining data/network-manager-1.27.91/shared/nm-std-aux/nm-std-utils.c Examining data/network-manager-1.27.91/shared/nm-std-aux/c-list-util.h Examining data/network-manager-1.27.91/shared/nm-std-aux/nm-std-utils.h Examining data/network-manager-1.27.91/shared/nm-std-aux/unaligned.h Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd.h Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd-bpf-fallback.c Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd-private.h Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c Examining data/network-manager-1.27.91/shared/n-acd/src/util/timer.c Examining data/network-manager-1.27.91/shared/n-acd/src/util/timer.h Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd.c Examining data/network-manager-1.27.91/shared/n-acd/src/n-acd-bpf.c Examining data/network-manager-1.27.91/shared/nm-meta-setting.h Examining data/network-manager-1.27.91/shared/nm-test-utils-impl.c Examining data/network-manager-1.27.91/shared/systemd/nm-sd-utils-shared.c Examining data/network-manager-1.27.91/shared/systemd/nm-sd-utils-shared.h Examining data/network-manager-1.27.91/shared/systemd/nm-logging-stub.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/list.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/sparse-endian.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_fcntl.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/hash-funcs.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/errno-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/cgroup-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/macro.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/time-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/env-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_random.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/mempool.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/env-file.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/prioq.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/set.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/signal-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/format-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/sort-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_stat.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/io-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/escape.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/signal-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/fileio.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/extract-word.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/stdio-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/prioq.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/env-file.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/in-addr-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/hash-funcs.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/stat-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/strv.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_type.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/in-addr-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/async.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/parse-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/memory-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/extract-word.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/strv.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/string-table.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_socket.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/escape.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/string-table.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/mempool.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/umask-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/parse-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/log.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/random-util.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/stat-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/memory-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/siphash24.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/utf8.h Examining data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c Examining data/network-manager-1.27.91/shared/systemd/src/basic/missing_syscall.h Examining data/network-manager-1.27.91/shared/systemd/src/shared/web-util.h Examining data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.h Examining data/network-manager-1.27.91/shared/systemd/src/shared/web-util.c Examining data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/gunicode.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/virt.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_timerfd.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/nulstr-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/user-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/def.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/locale-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_keyctl.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_magic.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/architecture.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/memfd-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/glob-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/nm-sd-adapt-shared.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/dhcp-server-internal.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/mkdir.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/rlimit-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/copy.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/arphrd-list.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/build.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/namespace-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/raw-clone.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/ioprio.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_sched.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/blockdev-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_fs.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/terminal-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/dirent-util.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/missing_network.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/errno-list.h Examining data/network-manager-1.27.91/shared/systemd/sd-adapt-shared/unaligned.h Examining data/network-manager-1.27.91/dispatcher/nm-dispatcher-utils.c Examining data/network-manager-1.27.91/dispatcher/nm-dispatcher.c Examining data/network-manager-1.27.91/dispatcher/nm-dispatcher-utils.h Examining data/network-manager-1.27.91/dispatcher/tests/test-dispatcher-envp.c FINAL RESULTS: data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:307:13: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(procfs_path, m) < 0) { data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-writer.c:384:9: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(path, owner_uid, owner_grp) < 0) { data/network-manager-1.27.91/clients/cli/utils.c:1496:13: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp(pager, pager, NULL); data/network-manager-1.27.91/clients/cli/utils.c:1497:13: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/sh", "sh", "-c", pager, NULL); data/network-manager-1.27.91/clients/cli/utils.c:1506:9: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp("pager", "pager", NULL); data/network-manager-1.27.91/clients/cli/utils.c:1508:9: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp("less", "less", NULL); data/network-manager-1.27.91/clients/cli/utils.c:1509:9: [4] (shell) execlp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execlp("more", "more", NULL); data/network-manager-1.27.91/dispatcher/nm-dispatcher.c:77:13: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(__VA_ARGS__); \ data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2080:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(key_name, is_route ? "route" : "address"); data/network-manager-1.27.91/shared/c-stdaux/src/c-stdaux.h:64:54: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _c_printf_(_a, _b) __attribute__((__format__(printf, _a, _b))) data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:254:13: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(_NM_UTILS_MACRO_FIRST(__VA_ARGS__) "\n" _NM_UTILS_MACRO_REST(__VA_ARGS__)); \ data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1331:5: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(__nmtst_internal.sudo_cmd, argv); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:694:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (errno != EROFS || access(filename, F_OK) >= 0) data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1289:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(p, mode) < 0) { data/network-manager-1.27.91/shared/systemd/src/basic/macro.h:12:50: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define _printf_(a, b) __attribute__((__format__(printf, a, b))) data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:194:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p, t); data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:604:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(name, X_OK) < 0) data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:641:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(j, X_OK) >= 0) { data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:649:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(with_dash, X_OK) >= 0) data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:107:47: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). path_simplify(strcpy(prefix, path), false); \ data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:116:47: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). path_simplify(strcpy(prefix, path), false); \ data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:143:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_p, _path); \ data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1532:9: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(path, l); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:27:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(stpcpy(_r_, "/proc/self/"), _field_); \ data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:30:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_r_, "/proc/" PID_FMT "/%s", _pid_, _field_); \ data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:288:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access("/proc/net/if_inet6", F_OK) != 0) data/network-manager-1.27.91/shared/systemd/src/basic/stat-util.c:152:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(path, W_OK) < 0 && errno == EROFS) data/network-manager-1.27.91/shared/systemd/src/basic/stdio-util.h:13:19: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ((size_t) snprintf(buf, len, fmt, __VA_ARGS__) < (len)) data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.c:60:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. i = vsnprintf(*dest, size, src, va); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:383:17: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf + n, ".%06"PRI_USEC, t % USEC_PER_SEC); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:413:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf + n, tm.tm_zone); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:437:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT " years " USEC_FMT " months %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:441:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT " months " USEC_FMT " days %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:445:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT " weeks " USEC_FMT " days %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:449:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT " days %s", d / USEC_PER_DAY, s); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:454:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT "h %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:457:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT "h " USEC_FMT "min %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:461:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT "min %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:464:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT "min " USEC_FMT "s %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:468:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT "s %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:471:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT "ms %s", data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:474:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, l, USEC_FMT"us %s", data/network-manager-1.27.91/shared/systemd/src/basic/util.c:81:35: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. saved_in_initrd = access("/etc/initrd-release", F_OK) >= 0 && data/network-manager-1.27.91/src/dns/nm-dns-manager.c:774:14: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if ((f = popen(cmd, "w")) == NULL) { data/network-manager-1.27.91/src/main.c:327:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stdout, NM_DIST_VERSION "\n"); data/network-manager-1.27.91/src/nm-config-data.c:729:13: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stream, \ data/network-manager-1.27.91/src/nm-iface-helper.c:555:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stdout, NM_DIST_VERSION "\n"); data/network-manager-1.27.91/src/nm-logging.c:791:9: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. syslog(level_desc[level].syslog_level, MESSAGE_FMT, MESSAGE_ARG(g->prefix, tv, msg)); data/network-manager-1.27.91/src/platform/nm-fake-platform.c:256:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(link->name, name); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:9543:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(path, W_OK) < 0 && errno == EROFS) data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1760:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ifname_buf_last_try, ifname); data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1779:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(out_ifname, ifname); data/network-manager-1.27.91/src/platform/nmp-netns.c:534:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access("/sys", W_OK) == -1) data/network-manager-1.27.91/src/platform/tests/test-common.c:44:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return !nmtstp_is_root_test() || (access("/sys/devices", W_OK) == 0); data/network-manager-1.27.91/src/platform/tests/test-common.c:712:14: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. result = system(command); data/network-manager-1.27.91/src/platform/tests/test-link.c:528:12: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. return system(cmd); data/network-manager-1.27.91/src/platform/tests/test-link.c:2747:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access("/proc/sys/net/ipv4/ip_forward", W_OK) == -1) { data/network-manager-1.27.91/src/platform/tests/test-link.c:3484:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. proc_writable = access(PATH, W_OK) == 0; data/network-manager-1.27.91/src/platform/tests/test-nmp-object.c:582:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access("/sys", W_OK) == 0) data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:6401:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(p_path, X_OK) == 0) { data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:92:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(dst, *src); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:96:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(dst, *src); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:801:17: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(f, "%s/%" PRIu8, inet_ntop(AF_INET, &dest, sbuf, sizeof sbuf), length); data/network-manager-1.27.91/src/systemd/src/systemd/_sd-common.h:30:56: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define _sd_printf_(a,b) __attribute__((__format__(printf, a, b))) data/network-manager-1.27.91/src/tests/test-core.c:1766:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str, STR_ORIG); data/network-manager-1.27.91/src/tests/test-core.c:1772:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, BUF_ORIG); data/network-manager-1.27.91/clients/cli/connections.c:6587:33: [3] (buffer) g_get_home_dir: This function is synonymous with 'getenv("HOME")';it returns untrustable input if the environment can beset by an attacker. It can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. filename = g_build_filename(g_get_home_dir(), NMCLI_EDITOR_HISTORY, NULL); data/network-manager-1.27.91/clients/cli/connections.c:6623:33: [3] (buffer) g_get_home_dir: This function is synonymous with 'getenv("HOME")';it returns untrustable input if the environment can beset by an attacker. It can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. filename = g_build_filename(g_get_home_dir(), NMCLI_EDITOR_HISTORY, NULL); data/network-manager-1.27.91/clients/cli/devices.c:4018:13: [3] (random) g_random_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. c = g_random_int_range(33, 126); data/network-manager-1.27.91/clients/cli/devices.c:4021:17: [3] (random) g_random_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. c = g_random_int_range(33, 126); data/network-manager-1.27.91/clients/cli/devices.c:4040:18: [3] (random) g_random_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. digit = g_random_int_range(0, 16); data/network-manager-1.27.91/clients/cli/utils.c:1450:25: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *pager = getenv("PAGER"); data/network-manager-1.27.91/clients/common/nm-polkit-listener.c:175:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. user = getenv("USER"); data/network-manager-1.27.91/dispatcher/nm-dispatcher.c:671:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. real = realpath(dir, NULL); data/network-manager-1.27.91/libnm-core/nm-utils.c:466:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. lang = getenv("LC_ALL"); data/network-manager-1.27.91/libnm-core/nm-utils.c:468:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. lang = getenv("LC_CTYPE"); data/network-manager-1.27.91/libnm-core/nm-utils.c:470:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. lang = getenv("LANG"); data/network-manager-1.27.91/libnm-core/tests/test-general.c:4710:25: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. guint32 r = g_rand_int(rand); data/network-manager-1.27.91/libnm-core/tests/test-general.c:8295:23: [3] (random) g_rand_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. numbits = g_rand_int_range(rand, 1, 65); data/network-manager-1.27.91/libnm-core/tests/test-general.c:8297:47: [3] (random) g_rand_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. guint64 v = (((guint64) 1) << g_rand_int_range(rand, 0, 64)); data/network-manager-1.27.91/libnm/nm-libnm-aux/nm-libnm-aux.c:104:10: [3] (random) g_random_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ((g_random_int() % 2) == 0) { data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:173:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. uint64_t random; data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:176:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. n_time += random % n_jitter; data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:76:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. static int n_acd_get_random(unsigned int *random) { data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-probe.c:375:16: [3] (random) jrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return jrand48(config->entropy); data/network-manager-1.27.91/shared/nm-glib-aux/nm-random-utils.c:135:24: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. .v32 = g_rand_int(rand), data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:866:20: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. seed = g_rand_int(__nmtst_internal.rand); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:889:12: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return g_rand_int(nmtst_get_rand()); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:897:24: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (((guint64) g_rand_int(rand))) | (((guint64) g_rand_int(rand)) << 32); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:897:57: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (((guint64) g_rand_int(rand))) | (((guint64) g_rand_int(rand)) << 32); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:938:13: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. v = g_rand_int(rand); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:942:13: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. v = g_rand_int(rand); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:984:13: [3] (random) g_rand_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. j = g_rand_int_range(rand, 0, i); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1016:33: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. tmp = g_slist_nth(list, g_rand_int(rand) % l); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1081:23: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. guint32 rnd = g_rand_int(rand); data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:456:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. return getenv(t); data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:740:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. e = getenv(p); data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:619:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = getenv("PATH"); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:857:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. e = getenv(field); data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c:353:9: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(x); data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient.c:465:26: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. system_bus_address = getenv("DBUS_SYSTEM_BUS_ADDRESS"); data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhcpcanon.c:130:26: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. system_bus_address = getenv("DBUS_SYSTEM_BUS_ADDRESS"); data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper.c:109:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. pid_str = getenv("pid"); data/network-manager-1.27.91/src/dns/nm-dns-manager.c:877:28: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rc_path_real = realpath(_PATH_RESCONF, NULL); data/network-manager-1.27.91/src/dns/nm-dns-manager.c:1996:21: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. real_path = realpath(_PATH_RESCONF, NULL); data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:117:57: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (nm_logging_enabled(LOGL_TRACE, LOGD_SHARING) || getenv("NM_DNSMASQ_DEBUG")) { data/network-manager-1.27.91/src/main.c:86:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *env = getenv("NM_DEBUG"); data/network-manager-1.27.91/src/main.c:354:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. path = realpath("/proc/self/exe", NULL); data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:872:35: [3] (random) g_random_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. g_timeout_add_seconds(g_random_int_range(NM_NDISC_ROUTER_ADVERT_DELAY, data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:908:35: [3] (random) g_random_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. g_timeout_add_seconds(g_random_int_range(0, NM_NDISC_ROUTER_ADVERT_DELAY), data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:926:42: [3] (random) g_random_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. priv->send_ra_id = g_timeout_add(g_random_int_range(0, NM_NDISC_ROUTER_ADVERT_DELAY_MS), data/network-manager-1.27.91/src/nm-core-utils.c:3855:20: [3] (random) g_random_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. oui = ouis[g_random_int() % ouis_len]; data/network-manager-1.27.91/src/ppp/nm-ppp-manager.c:798:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. ppp_debug = !!getenv("NM_PPP_DEBUG"); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:485:21: [3] (random) g_rand_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. itest = g_rand_int_range(rand, 0, max_test_idx); data/network-manager-1.27.91/src/tests/test-core.c:52:33: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ((guint32 *) addr)[i] = g_rand_int(r); data/network-manager-1.27.91/src/tests/test-core.c:1108:17: [3] (random) g_rand_int: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. j = g_rand_int(nmtst_get_rand()) % (i + 1); data/network-manager-1.27.91/src/tests/test-ip6-config.c:265:21: [3] (random) g_rand_int_range: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int j = g_rand_int_range(nmtst_get_rand(), i, addr_count); data/network-manager-1.27.91/clients/cli/common.c:976:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rl_line_buffer[i], subst, subst_len); data/network-manager-1.27.91/clients/cli/connections.c:3768:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char prompt[128] = {0}; data/network-manager-1.27.91/clients/cli/connections.c:6639:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[100]; data/network-manager-1.27.91/clients/cli/connections.c:9398:27: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). char tmpfile[] = "/tmp/nmcli-export-temp-XXXXXX"; data/network-manager-1.27.91/clients/cli/connections.c:9465:29: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). fd = g_mkstemp_full(tmpfile, O_RDWR | O_CLOEXEC, 0600); data/network-manager-1.27.91/clients/cli/connections.c:9469:29: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). tmpfile); data/network-manager-1.27.91/clients/cli/connections.c:9473:16: [2] (tmpfile) tmpfile: Function tmpfile() has a security flaw on some systems (e.g., older System V systems) (CWE-377). path = tmpfile; data/network-manager-1.27.91/clients/cli/devices.c:31:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *flags_str[16]; data/network-manager-1.27.91/clients/cli/devices.c:1061:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sorted, devs->pdata, devs->len * sizeof(NMDevice *)); data/network-manager-1.27.91/clients/cli/devices.c:1364:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *caps_str[8]; /* Enough space for caps and terminating NULL */ data/network-manager-1.27.91/clients/cli/devices.c:4054:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char generated_key[11]; data/network-manager-1.27.91/clients/cli/nmcli.c:159:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *option_with_value[2] = {option, prefix}; data/network-manager-1.27.91/clients/cli/nmcli.c:527:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * tmp_palette[_NM_META_COLOR_NUM] = {DEFAULT_PALETTE_INIT}; data/network-manager-1.27.91/clients/cli/nmcli.c:528:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *const map[_NM_META_COLOR_NUM] = { data/network-manager-1.27.91/clients/cli/nmcli.c:652:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(palette, tmp_palette, sizeof(tmp_palette)); data/network-manager-1.27.91/clients/cli/nmcli.h:100:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *palette[_NM_META_COLOR_NUM]; /* Color palette */ data/network-manager-1.27.91/clients/cli/settings.c:230:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[16]; data/network-manager-1.27.91/clients/cli/utils.c:365:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char slashes[4] = {'|', '/', '-', '\\'}; data/network-manager-1.27.91/clients/cli/utils.c:1115:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if (value && ((const char *const *) value)[0]) { data/network-manager-1.27.91/clients/cli/utils.c:1424:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/network-manager-1.27.91/clients/cli/utils.c:1645:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. for (p = (const char **) field_values[idx].value, j = 1; p && *p; p++, j++) { data/network-manager-1.27.91/clients/cli/utils.c:1653:49: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. section_prefix ? (const char *) field_values[0].value : "", data/network-manager-1.27.91/clients/cli/utils.c:1669:52: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * hdr_name = (const char *) field_values[0].value; data/network-manager-1.27.91/clients/cli/utils.c:1670:52: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * val = (const char *) field_values[idx].value; data/network-manager-1.27.91/clients/cloud-setup/main.c:327:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:268:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) line)[line_len] = '\0'; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:271:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) line)[--line_len] = '\0'; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:280:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:309:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[30]; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:343:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:436:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) line)[line_len] = '\0'; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:439:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) line)[--line_len] = '\0'; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-azure.c:467:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.c:276:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[0]; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.c:442:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) cur_line)[cur_line_len] = '\0'; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-ec2.c:455:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mac_data->path, cur_line, cur_line_len + 1u); data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:223:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) line)[line_len] = '\0'; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:281:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[100]; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:362:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) line)[line_len] = '\0'; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:364:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) line)[--line_len] = '\0'; data/network-manager-1.27.91/clients/cloud-setup/nmcs-provider-gcp.c:386:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[100]; data/network-manager-1.27.91/clients/common/nm-client-utils.c:772:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) s)[0] = '\0'; data/network-manager-1.27.91/clients/common/nm-client-utils.c:775:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) s)[0] = '\0'; data/network-manager-1.27.91/clients/common/nm-client-utils.c:800:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) s)[0] = '\0'; data/network-manager-1.27.91/clients/common/nm-client-utils.c:823:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) s)[0] = '\0'; data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:413:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. &((char *) data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:417:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pdata, str->str, str->len); data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:1084:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_numeric[64]; data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:1970:52: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. nm_utils_escaped_tokens_options_split((char *) strv[i], &opt_name, &opt_value); data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2891:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. dcb_parse_uint_array(const char *val, data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:321:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[100]; data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:527:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char read_buf[5]; data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:332:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:378:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ifname, cstr, len); data/network-manager-1.27.91/clients/common/qrcodegen.c:78:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void addRunToHistory(unsigned char run, unsigned char history[7]); data/network-manager-1.27.91/clients/common/qrcodegen.c:78:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void addRunToHistory(unsigned char run, unsigned char history[7]); data/network-manager-1.27.91/clients/common/qrcodegen.c:79:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static bool hasFinderLikePattern(unsigned char runHistory[7]); data/network-manager-1.27.91/clients/common/qrcodegen.c:735:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char runHistory[7] = {0}; data/network-manager-1.27.91/clients/common/qrcodegen.c:761:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char runHistory[7] = {0}; data/network-manager-1.27.91/clients/common/qrcodegen.c:814:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. addRunToHistory(unsigned char run, unsigned char history[7]) data/network-manager-1.27.91/clients/common/qrcodegen.c:814:45: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. addRunToHistory(unsigned char run, unsigned char history[7]) data/network-manager-1.27.91/clients/common/qrcodegen.c:824:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. hasFinderLikePattern(unsigned char runHistory[7]) data/network-manager-1.27.91/clients/common/qrcodegen.c:979:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, data, len * sizeof(buf[0])); data/network-manager-1.27.91/clients/tui/newt/nmt-newt-entry-numeric.c:129:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:52:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). gboolean open; data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:228:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (priv->open) { data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:253:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (priv->open) data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:309:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (priv->open) { data/network-manager-1.27.91/clients/tui/newt/nmt-newt-section.c:351:42: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). g_value_set_boolean(value, priv->open); data/network-manager-1.27.91/clients/tui/newt/nmt-newt-utils.c:299:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * filename, *argv[3]; data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.c:201:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char input[66]; data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.c:212:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(input, g_bytes_get_data(ssid, NULL), g_bytes_get_size(ssid)); data/network-manager-1.27.91/clients/tui/nmt-connect-connection-list.c:239:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&input[33], &input[0], 32); data/network-manager-1.27.91/clients/tui/nmt-mtu-entry.c:64:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (*text && !atoi(text)) { data/network-manager-1.27.91/clients/tui/nmtui.c:262:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. argv[0] = (char *) subprograms[i].shortcut; data/network-manager-1.27.91/dispatcher/nm-dispatcher.c:495:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * argv[4]; data/network-manager-1.27.91/dispatcher/tests/test-dispatcher-envp.c:270:59: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). addr = nm_ip_address_new(AF_INET, ip, (guint) atoi(prefix), error); data/network-manager-1.27.91/dispatcher/tests/test-dispatcher-envp.c:321:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (guint) atoi(metric), data/network-manager-1.27.91/examples/C/glib/get-ap-info-libnm.c:24:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *flags_str[16]; /* Enough space for flags and terminating NULL */ data/network-manager-1.27.91/examples/C/glib/list-connections-libnm.c:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestamp_real_str[64]; data/network-manager-1.27.91/libnm-core/nm-connection.c:706:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[37]; data/network-manager-1.27.91/libnm-core/nm-connection.c:992:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char normalized[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-core-internal.h:666:45: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out_xifname[static 16]); data/network-manager-1.27.91/libnm-core/nm-crypto-gnutls.c:224:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(padded_buf.bin, data, data_len); data/network-manager-1.27.91/libnm-core/nm-crypto-nss.c:339:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(padded_buf.bin, data, data_len); data/network-manager-1.27.91/libnm-core/nm-crypto-nss.c:448:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pw.data, ucs2_password.bin, ucs2_password.len); data/network-manager-1.27.91/libnm-core/nm-crypto.c:1075:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ret->bin[ret_idx], line, line_l); data/network-manager-1.27.91/libnm-core/nm-errors.c:30:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_name[200]; data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:602:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, key, sizeof(char) * i); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:907:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char options_key[128]; data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1075:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_HWADDR_LEN_MAX * 3]; data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1483:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pathuri, data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1486:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pathuri[NM_STRLEN(NM_KEYFILE_CERT_SCHEME_PREFIX_PATH)], path, path_len + 1); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1997:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kf_key[32]; data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2074:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_name[64]; data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2122:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(key_name_idx, "%u", i + 1); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2266:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_name_full[100] = "routing-rule"; data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2280:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(key_name_num, "%u", ++j); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:3696:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numstr[64]; data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:3845:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char group[NM_STRLEN(NM_KEYFILE_GROUPPREFIX_WIREGUARD_PEER) + 200]; data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-libnm-core-aux.c:153:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * data/network-manager-1.27.91/libnm-core/nm-libnm-core-aux/nm-libnm-core-aux.c:290:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) val)[0] = '\0'; data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.c:114:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const nm_auth_permission_names_by_idx[NM_CLIENT_PERMISSION_LAST] = { data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.h:128:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *const nm_auth_permission_names_by_idx[NM_CLIENT_PERMISSION_LAST]; data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:348:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem, data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:351:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mem[NM_STRLEN(NM_SETTING_802_1X_CERT_SCHEME_PREFIX_PATH)], val_bin, val_len); data/network-manager-1.27.91/libnm-core/nm-setting-dcb.c:715:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(a, src->data, total_len); data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:86:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:146:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:229:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:475:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:936:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2230:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out_xifname[static 16 /* IFNAMSIZ */]) data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2794:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. nm_assert(g_variant_type_string_is_valid((const char *) rr_dbus_data[attr].dbus_type)); data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2837:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (const char *) rr_dbus_data[attr].dbus_type, data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2964:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:3186:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *str_word = (char *) tokens[i_token]; data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:3485:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-ip6-config.c:268:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_token[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-team.c:205:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. str = &((char *) watcher)[nm_offsetofend(NMTeamLinkWatcher, nsna_ping)]; data/network-manager-1.27.91/libnm-core/nm-setting-team.c:207:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, target_host, l_target_host); data/network-manager-1.27.91/libnm-core/nm-setting-team.c:348:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. str = &((char *) watcher)[nm_offsetofend(NMTeamLinkWatcher, arp_ping)]; data/network-manager-1.27.91/libnm-core/nm-setting-team.c:350:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, target_host, l_target_host); data/network-manager-1.27.91/libnm-core/nm-setting-team.c:354:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, source_host, l_source_host); data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.c:635:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrstr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.c:1534:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((const char **) strv)[i]++; data/network-manager-1.27.91/libnm-core/nm-team-utils.c:1952:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *keys[3]; data/network-manager-1.27.91/libnm-core/nm-utils.c:162:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ep->endpoint, endpoint, l_endpoint); data/network-manager-1.27.91/libnm-core/nm-utils.c:165:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ep->endpoint[i], host, l_host); data/network-manager-1.27.91/libnm-core/nm-utils.c:458:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char * default_encodings[4]; data/network-manager-1.27.91/libnm-core/nm-utils.c:673:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char escaped[ESSID_MAX_SIZE * 2 + 1]; data/network-manager-1.27.91/libnm-core/nm-utils.c:678:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(escaped, "<hidden>", sizeof("<hidden>")); data/network-manager-1.27.91/libnm-core/nm-utils.c:4745:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static _nm_thread_local char _nm_utils_inet_ntop_buffer[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/nm-utils.c:5016:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[1]; data/network-manager-1.27.91/libnm-core/nm-utils.c:5098:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&k->data[0], v1, l1); data/network-manager-1.27.91/libnm-core/nm-utils.c:5100:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&k->data[l1], v2, l2); data/network-manager-1.27.91/libnm-core/nm-utils.c:5782:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out_key, bin_arr, required_key_len); data/network-manager-1.27.91/libnm-core/nm-vpn-editor-plugin.c:212:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vt, p_vt, MIN(vt_size, p_vt_size)); data/network-manager-1.27.91/libnm-core/nm-vpn-plugin-info.c:340:50: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if (!dir[i] || nm_utils_strv_find_first((char **) dir, i, dir[i]) >= 0) data/network-manager-1.27.91/libnm-core/tests/test-crypto.c:380:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char digest[LONG_DIGEST], *hex; data/network-manager-1.27.91/libnm-core/tests/test-general.c:743:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char random_token[2] = {0}; data/network-manager-1.27.91/libnm-core/tests/test-general.c:1718:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * to_del[TO_DEL_NUM]; data/network-manager-1.27.91/libnm-core/tests/test-general.c:3229:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[9] = {0x61, 0x62, 0x63, 0xff, 0xfe, 0xfd, 0x23, 0x01, 0x00}; data/network-manager-1.27.91/libnm-core/tests/test-general.c:3304:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * perms[2]; data/network-manager-1.27.91/libnm-core/tests/test-general.c:3335:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[9] = {0x61, 0x62, 0x63, 0xff, 0xfe, 0xfd, 0x23, 0x01, 0x00}; data/network-manager-1.27.91/libnm-core/tests/test-general.c:7419:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char i_str[30]; data/network-manager-1.27.91/libnm-core/tests/test-general.c:9701:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd_1 = open("/dev/null", O_RDONLY | O_CLOEXEC); data/network-manager-1.27.91/libnm-core/tests/test-general.c:9711:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd_2 = open("/dev/null", O_RDONLY | O_CLOEXEC); data/network-manager-1.27.91/libnm-core/tests/test-general.c:9739:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/tests/test-setting.c:2925:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. g_hash_table_insert(hash, (char *) opt_keys[i], opt_vals[i]); data/network-manager-1.27.91/libnm-core/tests/test-setting.c:3463:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrstr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/libnm-core/tests/test-setting.c:3777:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_buf[16]; data/network-manager-1.27.91/libnm-core/tests/test-setting.c:3987:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[300]; data/network-manager-1.27.91/libnm/nm-client.c:6261:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(priv->nm.capabilities_arr, arr, len * sizeof(guint32)); data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:542:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node->sender, packet->arp_sha, ETH_ALEN); data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:617:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node->sender, packet->arp_sha, ETH_ALEN); data/network-manager-1.27.91/shared/n-acd/src/n-acd-probe.c:629:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(node->sender, packet->arp_sha, ETH_ALEN); data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:249:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(config->mac, mac, n_mac > ETH_ALEN ? ETH_ALEN : n_mac); data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:346:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(acd->mac, config->mac, ETH_ALEN); data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:498:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arp.arp_sha, acd->mac, sizeof(acd->mac)); data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:499:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arp.arp_tpa, &tpa->s_addr, sizeof(uint32_t)); data/network-manager-1.27.91/shared/n-acd/src/n-acd.c:502:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arp.arp_spa, &spa->s_addr, sizeof(spa->s_addr)); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:432:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(header->chaddr, connection->client_config->mac, ETH_ALEN); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1005:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char server_addr[INET_ADDRSTRLEN]; data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1006:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char client_addr[INET_ADDRSTRLEN]; data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1007:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[128]; data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1149:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serv_addr[INET_ADDRSTRLEN]; data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:1150:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char client_addr[INET_ADDRSTRLEN]; data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-lease.c:265:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, data, sizeof(struct in_addr)); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-probe.c:35:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(op->data, data, n_data); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-probe.c:362:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(config->entropy, seed16v, sizeof(seed16v)); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c:190:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(config->mac, mac, n_mac); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c:220:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(config->broadcast_mac, mac, n_mac); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c:253:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t, id, n_id); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-incoming.c:55:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t *)&incoming->message + *offset, raw + pos, l); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-incoming.c:211:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&incoming->message, raw, n_raw); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-outgoing.c:159:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(blob + outgoing->i_message, data, n_data); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c:356:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(haddr.sll_addr, dest_haddr, halen); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c:507:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CMSG_SPACE(sizeof(struct in_pktinfo))]; data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c:526:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(CMSG_DATA(cmsg), &pktinfo, sizeof(pktinfo)); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-socket.c:627:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pktinfo, (void*)CMSG_DATA(cmsg), sizeof(struct in_pktinfo)); data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.c:49:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&local, data, size); data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.c:134:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&local, data, size); data/network-manager-1.27.91/shared/n-dhcp4/src/util/packet.h:27:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sll_addr[32]; /* MAX_ADDR_LEN */ data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c:33:49: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_SIOCGIFNAME(int socket, int ifindex, char (*ifnamep)[IFNAMSIZ]) { data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c:46:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ifnamep, req.ifr_name, IFNAMSIZ); data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c:64:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ] = {}; data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.h:10:49: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_SIOCGIFNAME(int socket, int ifindex, char (*ifnamep)[IFNAMSIZ]); data/network-manager-1.27.91/shared/nm-default.h:213:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_buf[256 + 15]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-enum-utils.c:304:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[64]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.c:70:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(g_arr.v8, t_arr.v8, HASH_KEY_SIZE); data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.c:124:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&seed, g, HASH_KEY_SIZE); data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h:419:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static inline const char * data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h:420:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. nm_hash_obfuscated_ptr_str(gconstpointer ptr, char buf[static 17]) data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:32:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bstrerr[NM_STRERROR_BUFSIZE]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:163:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:235:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str + n_have, buf, n_read); data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:313:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY | O_CLOEXEC); data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.h:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source[NM_JSON_ERROR_SOURCE_LENGTH]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.h:68:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[NM_JSON_ERROR_TEXT_LENGTH]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c:91:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(self->filename, filename, l_filename + 1); data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c:93:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) self->group_name, group_name, l_group + 1); data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:738:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((const char *const[(sizeof(((const char *const[]){__VA_ARGS__})) / sizeof(const char *)) \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1371:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, str, l); data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1496:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, data, size); data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1554:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_ptr_md, (data), _size); \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1697:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&_buf[1], _str, _strlen_trunc); \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-random-utils.c:100:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/urandom", O_RDONLY | O_CLOEXEC | O_NOCTTY); data/network-manager-1.27.91/shared/nm-glib-aux/nm-ref-string.c:141:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rstr0->str_data, cstr, len); data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.c:111:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b->bin, mem, mem_len); data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h:129:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[0]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h:182:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_new, m_old, NM_MIN(cur_len, new_len)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h:220:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_new, m_old, NM_MIN(cur_len, new_len)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.h:258:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m_new, m_old, NM_MIN(cur_len, new_len)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:27:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char _nm_hexchar_table_lower[16] = "0123456789abcdef"; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:28:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char _nm_hexchar_table_upper[16] = "0123456789ABCDEF"; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:93:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, src_len); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:196:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*buf, str, *len - 1); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:201:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*buf, str, str_len); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:714:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, nbytes); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:932:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[INET_ADDRSTRLEN]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:954:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrstr_buf[MAX(INET_ADDRSTRLEN, INET6_ADDRSTRLEN)]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1021:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrstr_buf[MAX(INET_ADDRSTRLEN, INET6_ADDRSTRLEN)]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1097:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1699:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, str, str_len_p1); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1746:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. s = (char *) nm_str_skip_leading_spaces(ptr[i]); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1779:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. s = (char *) ptr[i_token]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3597:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. v[i] = (char *) strv[i]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3652:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. sbuf = &(((char *) result)[pre_len]); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3671:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbuf, strv[i], l); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3676:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. nm_assert(sbuf == (&((const char *) result)[pre_len]) + mem_len); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3812:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. cmp = cmpfcn(&((const char *) list)[elem_size * imid], needle, user_data); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3903:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5367:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5542:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_stack[4096]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5576:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_stack[4096]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:174:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, (addr_family != AF_INET6) ? sizeof(in_addr_t) : sizeof(struct in6_addr)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:230:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static inline const char * data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:231:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _nm_utils_inet4_ntop(in_addr_t addr, char dst[static INET_ADDRSTRLEN]) data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:236:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static inline const char * data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:237:51: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _nm_utils_inet6_ntop(const struct in6_addr *addr, char dst[static INET6_ADDRSTRLEN]) data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:245:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:739:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char _nm_utils_to_string_buffer[2096]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1008:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _bstrerr[NM_STRERROR_BUFSIZE]; \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1868:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char _nm_hexchar_table_lower[16]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1869:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char _nm_hexchar_table_upper[16]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1904:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static inline const char * data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.h:1905:56: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. nm_ether_addr_to_string(const NMEtherAddr *ether_addr, char sbuf[static(sizeof(NMEtherAddr) * 3)]) data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h:209:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&strbuf->_priv_str[strbuf->_priv_len], str, len); data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h:224:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&strbuf->_priv_str[strbuf->_priv_len], str, len); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:344:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const strv0[1] = {}; data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:345:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const strv1[2] = { data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:474:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strbuf1[G_N_ELEMENTS(buf) * 3]; data/network-manager-1.27.91/shared/nm-udev-aux/nm-udev-utils.c:57:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(unescaped, uproperty, l); data/network-manager-1.27.91/shared/nm-utils/nm-compat.c:46:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(keys, a->pdata, a->len * sizeof(gpointer)); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:939:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, &v, sizeof(guint32)); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:975:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, elmt_size * n_elmt); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:990:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bu, p_, elmt_size); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:991:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_, pj, elmt_size); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:992:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pj, bu, elmt_size); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1385:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static _nm_thread_local char buf[SIZE]; \ data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1404:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static _nm_thread_local char u[37]; data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1479:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static _nm_thread_local char buf[NM_CONST_MAX(INET6_ADDRSTRLEN, INET_ADDRSTRLEN)]; data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1506:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1530:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.c:22:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret, p, l); data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.h:69:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_q_, p, _l_); \ data/network-manager-1.27.91/shared/systemd/src/basic/alloc-util.h:79:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_q_, p, _l_); \ data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:715:33: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret + k, m, q * sizeof(char*)); data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:311:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, prefix, pl); data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:428:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ans + off, "...", c); data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.c:14:59: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* ether_addr_to_string(const struct ether_addr *addr, char buffer[ETHER_ADDR_TO_STRING_MAX]) { data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.c:22:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%02x:%02x:%02x:%02x:%02x:%02x", data/network-manager-1.27.91/shared/systemd/src/basic/ether-addr-util.h:13:59: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* ether_addr_to_string(const struct ether_addr *addr, char buffer[ETHER_ADDR_TO_STRING_MAX]); data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:384:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:478:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). r = open("/dev/null", O_RDONLY|O_CLOEXEC|O_NOCTTY); data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:546:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/shm", O_RDWR|O_TMPFILE|O_CLOEXEC, 0500); data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:577:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). r = open(pattern, O_RDONLY|O_CLOEXEC); data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:855:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). null_fd = open("/dev/null", (null_readable && null_writable ? O_RDWR : data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:937:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/fd-util.c:948:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). new_fd = open(procfs_path, flags); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:37:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(path, options); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:256:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(fn, O_WRONLY|O_CLOEXEC|O_NOCTTY | data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:387:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY|O_CLOEXEC); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:631:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:845:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, mode); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:889:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(p, mode); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:912:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, mode); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:934:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, mode); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:1026:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ln[DECIMAL_STR_MAX(n)+2]; data/network-manager-1.27.91/shared/systemd/src/basic/format-util.c:10:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *format_ifname_full(int ifindex, char buf[static IF_NAMESIZE + 1], FormatIfnameFlag flag) { data/network-manager-1.27.91/shared/systemd/src/basic/format-util.c:10:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *format_ifname_full(int ifindex, char buf[static IF_NAMESIZE + 1], FormatIfnameFlag flag) { data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h:64:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *format_ifname_full(int ifindex, char buf[static IF_NAMESIZE + 1], FormatIfnameFlag flag); data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h:64:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *format_ifname_full(int ifindex, char buf[static IF_NAMESIZE + 1], FormatIfnameFlag flag); data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h:65:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static inline char *format_ifname(int ifindex, char buf[static IF_NAMESIZE + 1]) { data/network-manager-1.27.91/shared/systemd/src/basic/format-util.h:65:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static inline char *format_ifname(int ifindex, char buf[static IF_NAMESIZE + 1]) { data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:226:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_PATH|O_CLOEXEC|O_NOFOLLOW); /* Let's acquire an O_PATH fd, as precaution to change data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:300:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:321:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:372:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fdpath[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:389:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_PATH|O_CLOEXEC|O_NOFOLLOW); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:396:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_WRONLY|O_CREAT|O_EXCL|O_CLOEXEC, IN_SET(mode, 0, MODE_INVALID) ? 0644 : mode); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:702:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int) + 1]; data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:844:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). r = open(path, O_PATH|O_CLOEXEC|((flags & CHASE_NOFOLLOW) ? O_NOFOLLOW : 0)); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:878:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(root ?: "/", O_CLOEXEC|O_DIRECTORY|O_PATH); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1062:38: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(root ?: "/", O_CLOEXEC|O_DIRECTORY|O_PATH); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1174:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). r = open(path, open_flags); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1203:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char procfs_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1284:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(fd) + 1]; data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1370:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64 * 1024]; data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1480:37: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). opened_fd = open(".", O_RDONLY|O_DIRECTORY|O_CLOEXEC); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1538:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(parent, flags, mode); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:1615:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p[SYS_BLOCK_PATH_MAX(NULL)]; data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.c:372:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hash_key, current, sizeof(current)); data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.c:472:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e_to, e_from, hashmap_type_info[h->type].entry_size); data/network-manager-1.27.91/shared/systemd/src/basic/hashmap.c:1108:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_storage, h->direct.storage, data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:41:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char table[16] = "0123456789abcdef"; data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:175:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char table[32] = "0123456789" data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:526:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char table[64] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:639:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, x + width * line, act); data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.c:235:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[HOST_NAME_MAX + 1] = {}; data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.c:328:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(path, "re"); data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c:25:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LINE_MAX]; data/network-manager-1.27.91/shared/systemd/src/basic/macro.h:418:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[(expr) ? 0 : -1]; \ data/network-manager-1.27.91/shared/systemd/src/basic/memory-util.h:23:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, n); data/network-manager-1.27.91/shared/systemd/src/basic/missing_socket.h:16:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char svm_zero[sizeof(struct sockaddr) - data/network-manager-1.27.91/shared/systemd/src/basic/missing_syscall.h:213:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char f_handle[0]; data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:941:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mempcpy(ret, path, e + 1 - path), filename, k + 1); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1496:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/tty", O_WRONLY); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1537:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1539:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(t, "%i", value); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:1546:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[STRLEN("/proc/self/fdinfo/") + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c:210:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &u, m); data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c:307:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/urandom", O_RDONLY|O_CLOEXEC|O_NOCTTY); data/network-manager-1.27.91/shared/systemd/src/basic/random-util.c:484:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info->buf, seed, size); data/network-manager-1.27.91/shared/systemd/src/basic/signal-util.c:213:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static thread_local char buf[STRLEN("RTMIN+") + DECIMAL_STR_MAX(int) + 1]; data/network-manager-1.27.91/shared/systemd/src/basic/siphash24.h:75:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static inline uint64_t siphash24_string(const char *s, const uint8_t k[static 16]) { data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:408:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[INET6_ADDRSTRLEN], ifname[IF_NAMESIZE + 1]; data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:545:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[NI_MAXHOST], *ret; data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:891:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(CMSG_DATA(cmsg), &fd, sizeof(int)); data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:1152:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret->sun_path + 1, path + 1, l); /* copy *with* trailing NUL byte */ data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:1159:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret->sun_path, path, l + 1); /* copy *with* trailing NUL byte */ data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:1176:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IF_NAMESIZE + 1]; data/network-manager-1.27.91/shared/systemd/src/basic/stat-util.c:236:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_RDONLY|O_CLOEXEC|O_NOCTTY|O_PATH); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:141:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r, s, a); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:142:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(r+a, suffix, b); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:439:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t, s, x); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:442:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(t + x + 3, s + old_length - suffix_len, suffix_len); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:538:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e, s, len); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:540:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e + len + 3, j, len2); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:564:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char four[4]; data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:576:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + i, four, w); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:689:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *strip_tab_ansi(char **ibuf, size_t *_isz, size_t highlight[2]) { data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:689:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *strip_tab_ansi(char **ibuf, size_t *_isz, size_t highlight[2]) { data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:180:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *strip_tab_ansi(char **ibuf, size_t *_isz, size_t highlight[2]); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:180:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *strip_tab_ansi(char **ibuf, size_t *_isz, size_t highlight[2]); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:242:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if (ascii_tolower(((char *)p)[i]) != ascii_tolower(token[i])) data/network-manager-1.27.91/shared/systemd/src/basic/strv.c:736:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m + n, *i, z + 1); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:360:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "--- XXXX-XX-XX XX:XX:XX"); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:371:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, weekdays[tm.tm_wday], 4); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:394:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf + n, " UTC"); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:1285:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("/usr/share/zoneinfo/zone1970.tab", "re"); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:1345:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:1383:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(t, O_RDONLY|O_CLOEXEC); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:129:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(stpcpy(stpcpy(stpcpy(mempcpy(t, p, fn - p), ".#"), extra), fn), "XXXXXX"); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:238:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(directory, flags|O_TMPFILE|O_EXCL, S_IRUSR|S_IWUSR); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:280:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(tmp, O_CREAT|O_EXCL|O_NOFOLLOW|O_NOCTTY|flags, 0640); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:307:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proc_fd_path[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(fd) + 1]; data/network-manager-1.27.91/shared/systemd/src/basic/util.c:103:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char contents[6]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:321:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[DNS_LABEL_MAX+1]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:357:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(decoded, buffer, l); data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:401:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(decoded, result, w); data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:427:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:456:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char escaped[DNS_LABEL_ESCAPED_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:501:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[DNS_LABEL_MAX+1]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:529:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char la[DNS_LABEL_MAX], lb[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:554:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char la[DNS_LABEL_MAX], lb[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:585:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ln[DNS_LABEL_MAX], ls[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:623:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ln[DNS_LABEL_MAX], lp[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:655:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ln[DNS_LABEL_MAX], ls[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:766:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[DNS_LABEL_MAX+1]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:802:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[DNS_LABEL_MAX+1]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:947:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:999:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char escaped[DNS_LABEL_ESCAPED_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1042:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[DNS_LABEL_MAX], b[DNS_LABEL_MAX], c[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1234:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *a_labels[DNS_N_LABELS_MAX+1], *b_labels[DNS_N_LABELS_MAX+1]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1252:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char la[DNS_LABEL_MAX], lb[DNS_LABEL_MAX]; data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1332:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[DNS_LABEL_MAX]; data/network-manager-1.27.91/src/NetworkManagerUtils.c:254:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[37]; data/network-manager-1.27.91/src/NetworkManagerUtils.c:1398:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/NetworkManagerUtils.c:1527:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:342:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bzobj->_object_path_intern, object_path, l); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:377:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_cap[100]; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:577:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _buf[500]; \ data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:768:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdata_hd->bdaddr_data, bdaddr, l); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:912:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_cap[100]; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:1320:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[37]; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:2397:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_cap[100]; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:2597:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_cap[100]; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:2680:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_cap[100]; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:174:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(context->rfcomm_tty_path, O_RDONLY | O_NOCTTY | O_CLOEXEC); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:225:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&req.src, &context->src, ETH_ALEN); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:226:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&req.dst, &context->dst, ETH_ALEN); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:337:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sa.rc_bdaddr, &context->src, ETH_ALEN); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:353:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sa.rc_bdaddr, &context->dst, ETH_ALEN); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:723:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&context->src_str[0], adapter, src_l); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:725:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) context->dst_str, remote, dst_l); data/network-manager-1.27.91/src/devices/bluetooth/nm-device-bt.c:825:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[100]; data/network-manager-1.27.91/src/devices/bluetooth/nm-device-bt.c:934:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[100]; data/network-manager-1.27.91/src/devices/nm-acd-manager.c:54:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf[64]; \ data/network-manager-1.27.91/src/devices/nm-acd-manager.c:91:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * data/network-manager-1.27.91/src/devices/nm-acd-manager.c:92:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _acd_event_to_string_buf(unsigned event, char buffer[static ACD_EVENT_TO_STRING_BUF_SIZE]) data/network-manager-1.27.91/src/devices/nm-acd-manager.c:180:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address_str[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-acd-manager.c:187:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char to_string_buffer[ACD_EVENT_TO_STRING_BUF_SIZE]; data/network-manager-1.27.91/src/devices/nm-acd-manager.c:256:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-acd-manager.c:416:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-acd-manager.c:478:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(self->hwaddr, hwaddr, ETH_ALEN); data/network-manager-1.27.91/src/devices/nm-device-bond.c:246:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device-bridge.c:442:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value_buf[100]; data/network-manager-1.27.91/src/devices/nm-device-bridge.c:788:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[32]; data/network-manager-1.27.91/src/devices/nm-device-ethernet.c:1642:45: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. g_hash_table_add(existing_ids, (char *) nm_settings_connection_get_id(connections[i])); data/network-manager-1.27.91/src/devices/nm-device-factory.c:275:59: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. list = g_hash_table_lookup(factories_by_setting, (char *) setting_types[i]); data/network-manager-1.27.91/src/devices/nm-device-factory.c:281:56: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. g_hash_table_insert(factories_by_setting, (char *) setting_types[i], list); data/network-manager-1.27.91/src/devices/nm-device-factory.h:179:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *const _setting_types_null[1] = {NULL}; \ data/network-manager-1.27.91/src/devices/nm-device-infiniband.c:65:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_verified[IFNAMSIZ]; data/network-manager-1.27.91/src/devices/nm-device-tun.c:168:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[100]; data/network-manager-1.27.91/src/devices/nm-device-vxlan.c:402:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:331:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf1[100]; data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:685:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_sockaddr[100]; data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:686:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_retry[100]; data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:740:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sockaddr.in.sin_addr, g_inet_address_to_bytes(a), sizeof(struct in_addr)); data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:752:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sockaddr.in6.sin6_addr, data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:879:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sockaddr_sbuf[100]; data/network-manager-1.27.91/src/devices/nm-device.c:1780:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&client_id_buf[1], digest, 15); data/network-manager-1.27.91/src/devices/nm-device.c:2656:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/network-manager-1.27.91/src/devices/nm-device.c:3014:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_buf[IFNAMSIZ]; data/network-manager-1.27.91/src/devices/nm-device.c:6847:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[128], buf2[128]; data/network-manager-1.27.91/src/devices/nm-device.c:7073:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/devices/nm-device.c:7100:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[37]; data/network-manager-1.27.91/src/devices/nm-device.c:7171:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device.c:8468:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device.c:9911:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device.c:10044:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device.c:10318:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[64], sbuf1[64], sbuf2[64]; data/network-manager-1.27.91/src/devices/nm-device.c:10881:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *) ip6_properties_to_save[i], data/network-manager-1.27.91/src/devices/nm-device.c:11601:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_addr[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device.c:11602:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_mask[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device.c:12265:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if (!g_hash_table_add(check_dups, (char *) whitelist[i])) data/network-manager-1.27.91/src/devices/nm-device.c:13921:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/nm-device.c:14554:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[512]; data/network-manager-1.27.91/src/devices/nm-device.c:14759:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str1[512]; data/network-manager-1.27.91/src/devices/nm-device.c:14760:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[512]; data/network-manager-1.27.91/src/devices/nm-device.c:15939:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[64]; data/network-manager-1.27.91/src/devices/nm-device.c:16781:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_HWADDR_LEN_MAX]; data/network-manager-1.27.91/src/devices/nm-device.c:16819:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[NM_UTILS_HWADDR_LEN_MAX_STR]; data/network-manager-1.27.91/src/devices/nm-lldp-listener.c:80:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf[64]; \ data/network-manager-1.27.91/src/devices/nm-lldp-listener.c:364:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a, &data[1], sizeof(a.addr4)); data/network-manager-1.27.91/src/devices/nm-lldp-listener.c:367:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a, &data[1], sizeof(a.addr6)); data/network-manager-1.27.91/src/devices/ovs/nm-ovsdb.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; /* Input buffer */ data/network-manager-1.27.91/src/devices/tests/test-acd.c:158:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/devices/tests/test-lldp.c:790:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/net/tun", O_RDWR | O_CLOEXEC); data/network-manager-1.27.91/src/devices/tests/test-lldp.c:832:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fixture->mac, link->l_address.data, ETH_ALEN); data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.c:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.c:274:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bss_info.bssid, bssid, sizeof(bssid)); data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi-p2p.c:90:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c:401:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c:1865:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[100]; data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c:2120:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psk[64]; data/network-manager-1.27.91/src/devices/wifi/nm-device-wifi.c:2124:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psk, array, psk_len); data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:25:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[0]; data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:66:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[32]; \ data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:233:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[50]; data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:302:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(id->buf, name, strsize); data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:385:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuid[37]; data/network-manager-1.27.91/src/devices/wifi/nm-wifi-ap.c:502:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf_ts[100]; data/network-manager-1.27.91/src/devices/wwan/nm-modem-broadband.c:121:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix_name[128]; \ data/network-manager-1.27.91/src/devices/wwan/nm-modem-ofono.c:77:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix_name[128]; \ data/network-manager-1.27.91/src/devices/wwan/nm-modem.c:124:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pp[_NMLOG_PREFIX_BUFLEN - 5]; data/network-manager-1.27.91/src/devices/wwan/nm-modem.c:137:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _prefix[_NMLOG_PREFIX_BUFLEN]; \ data/network-manager-1.27.91/src/devices/wwan/nm-modem.c:618:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(port, O_RDWR | O_NONBLOCK | O_NOCTTY | O_CLOEXEC); data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.c:30:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4096]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:273:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + 1, client_id, len); data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:336:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *state_table[NM_DHCP_STATE_MAX + 1] = { data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:468:53: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _LOGI("option %-20s => '%s'", keys[i], (char *) g_hash_table_lookup(options, keys[i])); data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:652:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proc_path[NM_STRLEN("/proc/%lu/cmdline") + 100]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:80:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) ss)[l - 1] = '\0'; data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:85:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) ss)[l - 1] = '\0'; data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:325:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char intf[IFNAMSIZ]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:636:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) p)[strlen(p) - 2] = '\0'; data/network-manager-1.27.91/src/dhcp/nm-dhcp-listener.c:82:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _prefix[64]; \ data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:118:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, *datap, n_out); data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:358:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:482:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:529:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:530:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gateway_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:723:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1006:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1066:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1425:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + 3, hostname, fqdn_len); data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:86:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:275:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char network_net_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:276:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gateway_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:535:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-systemd.c:777:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:125:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * addr[4] = {"0", "0", "0", "0"}; data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:184:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:185:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:405:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:758:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c + 1, client_id, len); data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-dhclient.c:489:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_STRLEN(EACID) + 1] = {0}; data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-dhclient.c:491:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + 1, EACID, NM_STRLEN(EACID)); data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:717:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. g_assert_cmpint(((const char *) p)[0], ==, 0); \ data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proc_path[256]; data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:422:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[100]; data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:485:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * argv[15]; data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:748:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dns/nm-dns-dnsmasq.c:812:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip_addr_to_string_buf[IP_ADDR_TO_STRING_BUFLEN]; data/network-manager-1.27.91/src/dns/nm-dns-manager.c:140:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[20]; \ data/network-manager-1.27.91/src/dns/nm-dns-manager.c:413:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_INET_ADDRSTRLEN + 50]; data/network-manager-1.27.91/src/dns/nm-dns-manager.c:496:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * argv[5]; data/network-manager-1.27.91/src/dns/nm-dns-manager.c:914:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(MY_RESOLV_CONF_TMP, "we")) == NULL) { data/network-manager-1.27.91/src/dns/nm-dns-manager.c:1123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dns/nm-dns-manager.c:1815:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(priv->prev_hash, priv->hash, sizeof(priv->hash)); data/network-manager-1.27.91/src/dns/nm-dns-manager.c:1940:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(_PATH_RESCONF, O_RDONLY | O_CLOEXEC); data/network-manager-1.27.91/src/dns/nm-dns-manager.c:2282:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dns/nm-dns-plugin.c:41:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[20]; \ data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:96:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char first[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char last[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char listen_address_s[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpaddr[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/dnsmasq/nm-dnsmasq-manager.c:208:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proc_path[250]; data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c:21:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _first[INET_ADDRSTRLEN]; \ data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c:22:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _last[INET_ADDRSTRLEN]; \ data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c:43:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _first[INET_ADDRSTRLEN]; \ data/network-manager-1.27.91/src/dnsmasq/tests/test-dnsmasq-utils.c:44:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _last[INET_ADDRSTRLEN]; \ data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c:397:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * dns[2] = { data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c:851:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * subchannels[4] = {0, 0, 0, 0}; data/network-manager-1.27.91/src/initrd/tests/test-cmdline-reader.c:1061:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[16]; data/network-manager-1.27.91/src/initrd/tests/test-cmdline-reader.c:1689:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vci_arg_long[512] = {0}; data/network-manager-1.27.91/src/main-utils.c:80:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pid[16]; data/network-manager-1.27.91/src/main-utils.c:85:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(pidfile, O_CREAT | O_WRONLY | O_TRUNC | O_CLOEXEC, 00644)) < 0) { data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c:349:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search_list[0]; data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c:463:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(search_list, dns_domain->domain, domain_len); data/network-manager-1.27.91/src/ndisc/nm-ndisc-private.h:46:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[64]; \ data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1132:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1191:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char changedstr[CONFIG_MAP_MAX_STR]; data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1192:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrstr[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1193:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_pref[35]; data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1194:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_exp[100]; data/network-manager-1.27.91/src/ndisc/nm-ndisc.c:1233:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/ndisc/tests/test-ndisc-fake.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/ndisc/tests/test-ndisc-fake.c:105:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-act-request.c:293:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * envp[1] = {NULL}; data/network-manager-1.27.91/src/nm-active-connection.c:122:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf[64]; \ data/network-manager-1.27.91/src/nm-active-connection.c:364:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[_NM_ACTIVATION_STATE_FLAG_TO_STRING_BUFSIZE]; data/network-manager-1.27.91/src/nm-active-connection.c:365:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[_NM_ACTIVATION_STATE_FLAG_TO_STRING_BUFSIZE]; data/network-manager-1.27.91/src/nm-auth-manager.c:72:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[30] = _NMLOG_PREFIX_NAME; \ data/network-manager-1.27.91/src/nm-auth-manager.c:96:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[30] = _NMLOG_PREFIX_NAME; \ data/network-manager-1.27.91/src/nm-auth-manager.c:311:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subject_buf[64]; data/network-manager-1.27.91/src/nm-checkpoint.c:77:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[32]; \ data/network-manager-1.27.91/src/nm-config-data.c:746:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(groups_full->pdata, groups, sizeof(groups[0]) * ngroups); data/network-manager-1.27.91/src/nm-config.c:453:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(no_auto_default_new, no_auto_default_current, sizeof(const char *) * idx); data/network-manager-1.27.91/src/nm-config.c:456:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&no_auto_default_new[idx + 1], data/network-manager-1.27.91/src/nm-config.c:2452:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, connection_uuid, connection_uuid_len); data/network-manager-1.27.91/src/nm-config.c:2457:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, perm_hw_addr_fake, perm_hw_addr_fake_len); data/network-manager-1.27.91/src/nm-config.c:2478:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[NM_STRLEN(NM_CONFIG_DEVICE_STATE_DIR "/") + DEVICE_STATE_FILENAME_LEN_MAX + 1]; data/network-manager-1.27.91/src/nm-config.c:2572:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[NM_STRLEN(NM_CONFIG_DEVICE_STATE_DIR "/") + DEVICE_STATE_FILENAME_LEN_MAX + 1]; data/network-manager-1.27.91/src/nm-config.c:2662:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_STRLEN(NM_CONFIG_DEVICE_STATE_DIR "/") + DEVICE_STATE_FILENAME_LEN_MAX + 1] = data/network-manager-1.27.91/src/nm-config.c:2688:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf_p, fn, fn_len + 1u); data/network-manager-1.27.91/src/nm-config.c:2690:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bb[30]; data/network-manager-1.27.91/src/nm-connectivity.c:741:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-core-utils.c:409:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log_name[1]; /* variable-length object, must be last element!! */ data/network-manager-1.27.91/src/nm-core-utils.c:488:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_exit[KC_EXIT_TO_STRING_BUF_SIZE], buf_wait[KC_WAITED_TO_STRING]; data/network-manager-1.27.91/src/nm-core-utils.c:540:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_exit[KC_EXIT_TO_STRING_BUF_SIZE]; data/network-manager-1.27.91/src/nm-core-utils.c:605:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_exit[KC_EXIT_TO_STRING_BUF_SIZE]; data/network-manager-1.27.91/src/nm-core-utils.c:742:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_exit[KC_EXIT_TO_STRING_BUF_SIZE]; data/network-manager-1.27.91/src/nm-core-utils.c:743:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_wait[KC_WAITED_TO_STRING]; data/network-manager-1.27.91/src/nm-core-utils.c:977:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_wait[KC_WAITED_TO_STRING]; data/network-manager-1.27.91/src/nm-core-utils.c:1294:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[30 + 1]; data/network-manager-1.27.91/src/nm-core-utils.c:2083:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ifname, parent_iface, parent_len); data/network-manager-1.27.91/src/nm-core-utils.c:2615:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[IFNAMSIZ]; data/network-manager-1.27.91/src/nm-core-utils.c:2624:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, path, l); data/network-manager-1.27.91/src/nm-core-utils.c:2687:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[37]; data/network-manager-1.27.91/src/nm-core-utils.c:2903:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char slen[100]; data/network-manager-1.27.91/src/nm-core-utils.c:3009:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_content, SECRET_KEY_V2_PREFIX, NM_STRLEN(SECRET_KEY_V2_PREFIX)); data/network-manager-1.27.91/src/nm-core-utils.c:3368:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out_iid->id_u8, hwaddr + INFINIBAND_ALEN - 8, 8); data/network-manager-1.27.91/src/nm-core-utils.c:3379:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out_iid->id_u8 + 4, &addr, 4); data/network-manager-1.27.91/src/nm-core-utils.c:3428:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr->s6_addr + 8, &iid.id_u8, 8); data/network-manager-1.27.91/src/nm-core-utils.c:3443:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iid, addr->s6_addr + 8, 8); data/network-manager-1.27.91/src/nm-core-utils.c:3483:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * data/network-manager-1.27.91/src/nm-core-utils.c:3485:46: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[static INET6_ADDRSTRLEN]) data/network-manager-1.27.91/src/nm-core-utils.c:3501:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[15]; data/network-manager-1.27.91/src/nm-core-utils.c:3755:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr->s6_addr + 8, &digest[0], 8); data/network-manager-1.27.91/src/nm-core-utils.c:3921:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bin_addr, digest, ETH_ALEN); data/network-manager-1.27.91/src/nm-core-utils.c:3980:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&client_id_buf[1], hwaddr, hwaddr_len); data/network-manager-1.27.91/src/nm-core-utils.c:4120:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arr[0], &duid_type, 2); data/network-manager-1.27.91/src/nm-core-utils.c:4121:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arr[2], &hw_type, 2); data/network-manager-1.27.91/src/nm-core-utils.c:4122:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arr[4], &duid_time, 4); data/network-manager-1.27.91/src/nm-core-utils.c:4123:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arr[8], hwaddr, hwaddr_len); data/network-manager-1.27.91/src/nm-core-utils.c:4140:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arr[0], &duid_type, 2); data/network-manager-1.27.91/src/nm-core-utils.c:4141:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arr[2], &hw_type, 2); data/network-manager-1.27.91/src/nm-core-utils.c:4142:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arr[4], hwaddr, hwaddr_len); data/network-manager-1.27.91/src/nm-core-utils.c:4164:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&duid_buffer[0], &duid_type, 2); data/network-manager-1.27.91/src/nm-core-utils.c:4165:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&duid_buffer[2], uuid, 16); data/network-manager-1.27.91/src/nm-core-utils.c:4460:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&addr, ip, sizeof(struct in6_addr)); data/network-manager-1.27.91/src/nm-core-utils.h:380:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nm_utils_inet6_interface_identifier_to_token(NMUtilsIPv6IfaceId iid, data/network-manager-1.27.91/src/nm-core-utils.h:381:58: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[static INET6_ADDRSTRLEN]); data/network-manager-1.27.91/src/nm-dbus-manager.c:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sender[0]; data/network-manager-1.27.91/src/nm-dbus-manager.c:556:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(caller_info->sender, sender, l); data/network-manager-1.27.91/src/nm-dcb.c:144:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10]; data/network-manager-1.27.91/src/nm-dispatcher.c:113:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extra_strings, log_ifname, l_log_ifname); data/network-manager-1.27.91/src/nm-dispatcher.c:120:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extra_strings, log_con_uuid, l_log_con_uuid); data/network-manager-1.27.91/src/nm-firewall-manager.c:114:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _prefix_name[30]; \ data/network-manager-1.27.91/src/nm-firewall-manager.c:115:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _prefix_info[100]; \ data/network-manager-1.27.91/src/nm-ip4-config.c:915:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-ip4-config.c:1956:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-ip4-config.c:2961:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_str[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-ip6-config.c:669:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-l3-config-data.c:174:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->data, src->data, src->len * elt_size); data/network-manager-1.27.91/src/nm-l3-config-data.c:335:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/nm-l3-config-data.c:336:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-l3cfg.c:240:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf_acd[NM_UTILS_INET_ADDRSTRLEN]; \ data/network-manager-1.27.91/src/nm-l3cfg.c:300:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-l3cfg.c:343:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/nm-l3cfg.c:488:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/nm-l3cfg.c:518:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[1000]; data/network-manager-1.27.91/src/nm-l3cfg.c:1061:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-l3cfg.c:2805:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[1024]; data/network-manager-1.27.91/src/nm-l3cfg.c:2890:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_commit_type[50]; data/network-manager-1.27.91/src/nm-l3cfg.c:3012:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_ct[30]; data/network-manager-1.27.91/src/nm-logging.c:191:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *_domains_to_string(gboolean include_level_override, data/network-manager-1.27.91/src/nm-logging.c:455:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char * data/network-manager-1.27.91/src/nm-logging.c:501:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _all_logging_domains_to_str[273]; data/network-manager-1.27.91/src/nm-logging.c:722:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * iov_free_data[5]; data/network-manager-1.27.91/src/nm-logging.c:726:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_log_domains_buf[NM_STRLEN("NM_LOG_DOMAINS=") + sizeof(_all_logging_domains_to_str)]; data/network-manager-1.27.91/src/nm-logging.c:818:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[255]; data/network-manager-1.27.91/src/nm-manager.c:243:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf[32]; \ data/network-manager-1.27.91/src/nm-manager.c:268:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf[32]; \ data/network-manager-1.27.91/src/nm-manager.c:295:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf[32]; \ data/network-manager-1.27.91/src/nm-manager.c:1163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[60]; data/network-manager-1.27.91/src/nm-manager.c:2816:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). src_fd = open(src, O_RDONLY | O_CLOEXEC); data/network-manager-1.27.91/src/nm-manager.c:2820:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dst_fd = open(dst, O_CREAT | O_EXCL | O_CLOEXEC | O_WRONLY, 0644); data/network-manager-1.27.91/src/nm-manager.c:7537:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/rfkill", O_RDWR | O_CLOEXEC); data/network-manager-1.27.91/src/nm-netns.c:243:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-netns.c:303:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-pacrunner-manager.c:132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-policy.c:186:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-policy.c:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-policy.c:329:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/nm-test-utils-core.h:244:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/nm-test-utils-core.h:313:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nm-fake-platform.c:65:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[32]; \ data/network-manager-1.27.91/src/platform/nm-fake-platform.c:270:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(link->l_address.data, address, address_len); data/network-manager-1.27.91/src/platform/nm-fake-platform.c:617:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obj_tmp->link.l_address.data, addr, len); data/network-manager-1.27.91/src/platform/nm-fake-platform.c:790:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-fake-platform.c:1207:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:480:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[32]; \ data/network-manager-1.27.91/src/platform/nm-linux-platform.c:1127:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_verified[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:1202:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(RTA_DATA(rta), data, alen); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:2886:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst->data, nla_data(nla), l); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3272:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->ip4_address.address, nla_data(tb[IFA_LOCAL]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3274:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->ip4_address.peer_address, nla_data(tb[IFA_ADDRESS]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3290:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->ip6_address.address, nla_data(tb[IFA_LOCAL]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3292:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->ip6_address.peer_address, nla_data(tb[IFA_ADDRESS]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3296:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->ip6_address.address, nla_data(tb[IFA_ADDRESS]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3306:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3435:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&nh.gateway, nla_data(ntb[RTA_GATEWAY]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3454:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&gateway, nla_data(tb[RTA_GATEWAY]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3516:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(obj->ip_route.network_ptr, nla_data(tb[RTA_DST]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3533:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->ip4_route.pref_src, nla_data(tb[RTA_PREFSRC]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3535:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->ip6_route.pref_src, nla_data(tb[RTA_PREFSRC]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:3543:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->ip6_route.src, nla_data(tb[RTA_SRC]), addr_len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5163:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_WRONLY | O_TRUNC | O_CLOEXEC); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5213:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(actual, value, len - 1); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5524:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(entry->path_data, pathid, len + 1); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5781:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[255]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5810:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _buf[255]; \ data/network-manager-1.27.91/src/platform/nm-linux-platform.c:6215:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:6216:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf2[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:6854:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_nlmsghdr[400]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7065:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[256]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7113:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[256]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7172:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[256]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7250:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[256]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7423:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_flags[100]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7492:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7544:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7660:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7662:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * values[3]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7663:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7807:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ivm.mac, vf->mac.data, vf->mac.len); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7922:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_verified[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7934:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_verified[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7962:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/net/tun", O_RDWR | O_CLOEXEC); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8058:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&map[current_n_map], set_map, sizeof(*set_map) * set_n_map); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8172:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_parent[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8174:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[20]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8718:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8786:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[256]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8827:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[256]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8871:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[256]; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:8965:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_nlmsghdr[400]; data/network-manager-1.27.91/src/platform/nm-netlink.c:339:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nm->nm_nlh, hdr, hdr->nlmsg_len); data/network-manager-1.27.91/src/platform/nm-netlink.c:382:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, data, len); data/network-manager-1.27.91/src/platform/nm-netlink.c:451:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, len); data/network-manager-1.27.91/src/platform/nm-netlink.c:483:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, nla_data(nla), len); data/network-manager-1.27.91/src/platform/nm-netlink.c:503:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nla_data(nla), data, datalen); data/network-manager-1.27.91/src/platform/nm-netlink.c:683:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg->nm_src, addr, sizeof(*addr)); data/network-manager-1.27.91/src/platform/nm-netlink.c:698:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg->nm_creds, creds, sizeof(*creds)); data/network-manager-1.27.91/src/platform/nm-netlink.c:726:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nlmsg_data(nlh), &hdr, sizeof(hdr)); data/network-manager-1.27.91/src/platform/nm-netlink.c:1332:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CMSG_SPACE(sizeof(struct ucred))]; data/network-manager-1.27.91/src/platform/nm-netlink.c:1353:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(CMSG_DATA(cmsg), creds, sizeof(struct ucred)); data/network-manager-1.27.91/src/platform/nm-netlink.h:137:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return &(((char *) nla)[NLA_HDRLEN]); data/network-manager-1.27.91/src/platform/nm-platform-utils.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char known_ifnames[2][IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:241:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(edata, edata_backup, edata_size); data/network-manager-1.27.91/src/platform/nm-platform-utils.c:310:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[50]; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:327:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[50]; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:731:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[255]; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1153:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, pdata, edata.e.size); data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1729:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_buf_last_try[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1730:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_buf[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1732:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sysdir[NM_STRLEN(SYS_CLASS_NET) + IFNAMSIZ] = SYS_CLASS_NET; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1733:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fd_buf[256]; data/network-manager-1.27.91/src/platform/nm-platform-utils.c:1762:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd_dir = open(sysdir, O_DIRECTORY | O_CLOEXEC); data/network-manager-1.27.91/src/platform/nm-platform-utils.h:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char driver[32]; data/network-manager-1.27.91/src/platform/nm-platform-utils.h:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[32]; data/network-manager-1.27.91/src/platform/nm-platform-utils.h:41:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fw_version[32]; data/network-manager-1.27.91/src/platform/nm-platform-utils.h:42:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _private_bus_info[32]; data/network-manager-1.27.91/src/platform/nm-platform-utils.h:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _private_erom_version[32]; data/network-manager-1.27.91/src/platform/nm-platform-utils.h:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _private_reserved2[12]; data/network-manager-1.27.91/src/platform/nm-platform.c:62:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * data/network-manager-1.27.91/src/platform/nm-platform.c:64:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[static(NM_UTILS_HWADDR_LEN_MAX * 3)]) data/network-manager-1.27.91/src/platform/nm-platform.c:113:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[32]; \ data/network-manager-1.27.91/src/platform/nm-platform.c:603:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:629:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char svalue[20]; data/network-manager-1.27.91/src/platform/nm-platform.c:631:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(svalue, "%d", value); data/network-manager-1.27.91/src/platform/nm-platform.c:643:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:644:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[128]; data/network-manager-1.27.91/src/platform/nm-platform.c:672:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:673:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[128]; data/network-manager-1.27.91/src/platform/nm-platform.c:807:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:825:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:844:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:860:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:861:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/network-manager-1.27.91/src/platform/nm-platform.c:1237:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_buf[NM_UTILS_HWADDR_LEN_MAX * 3]; data/network-manager-1.27.91/src/platform/nm-platform.c:1238:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parent_buf[64]; data/network-manager-1.27.91/src/platform/nm-platform.c:1239:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/network-manager-1.27.91/src/platform/nm-platform.c:1404:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * data/network-manager-1.27.91/src/platform/nm-platform.c:1405:59: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. nm_platform_if_indextoname(NMPlatform *self, int ifindex, char out_ifname[static 16 /* IFNAMSIZ */]) data/network-manager-1.27.91/src/platform/nm-platform.c:2414:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_lnk[256]; data/network-manager-1.27.91/src/platform/nm-platform.c:2415:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_peers[512]; data/network-manager-1.27.91/src/platform/nm-platform.c:2416:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_change_flags[100]; data/network-manager-1.27.91/src/platform/nm-platform.c:2490:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[255]; data/network-manager-1.27.91/src/platform/nm-platform.c:2558:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_verified[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform.c:2579:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_verified[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform.c:2700:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/network-manager-1.27.91/src/platform/nm-platform.c:2777:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform.c:2840:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_verified[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform.c:2958:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform.c:3256:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, " dev "); data/network-manager-1.27.91/src/platform/nm-platform.c:3287:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, S_FLAGS_PREFIX, NM_STRLEN(S_FLAGS_PREFIX)); data/network-manager-1.27.91/src/platform/nm-platform.c:3631:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[TO_STRING_DEV_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:3632:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:3633:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:3634:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_peer[INET_ADDRSTRLEN + 50]; data/network-manager-1.27.91/src/platform/nm-platform.c:3654:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[TO_STRING_DEV_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:3655:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:4451:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf1[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nm-platform.c:4452:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf2[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nm-platform.c:4801:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nm-platform.c:4890:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:4891:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_oif[64]; data/network-manager-1.27.91/src/platform/nm-platform.c:5474:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char master[20]; data/network-manager-1.27.91/src/platform/nm-platform.c:5475:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parent[20]; data/network-manager-1.27.91/src/platform/nm-platform.c:5476:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_flags[1 + NM_PLATFORM_LINK_FLAGS2STR_MAX_LEN + 1]; data/network-manager-1.27.91/src/platform/nm-platform.c:5477:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_highlighted_flags[50]; data/network-manager-1.27.91/src/platform/nm-platform.c:5480:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_addrmode[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5481:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_address[NM_UTILS_HWADDR_LEN_MAX * 3]; data/network-manager-1.27.91/src/platform/nm-platform.c:5482:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_broadcast[NM_UTILS_HWADDR_LEN_MAX * 3]; data/network-manager-1.27.91/src/platform/nm-platform.c:5483:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_inet6_token[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5664:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5665:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5666:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_remote[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5667:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_remote1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5668:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_ttl[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5669:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_tos[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5670:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_parent_ifindex[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5671:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_input_flags[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5672:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_output_flags[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5673:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_input_key[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5674:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_input_key1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5675:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_output_key[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5676:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_output_key1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5729:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_p_key[64]; data/network-manager-1.27.91/src/platform/nm-platform.c:5749:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5750:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5751:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_remote[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5752:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_remote1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5753:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_ttl[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5754:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_tclass[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5755:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_flow[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5756:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_encap[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5757:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_proto[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5758:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_parent_ifindex[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5801:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5802:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5803:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_remote[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5804:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_remote1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5805:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_ttl[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5806:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_tos[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5807:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_parent_ifindex[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5891:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5892:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5893:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_remote[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5894:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_remote1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:5895:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_ttl[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5896:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_tos[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5897:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_flags[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5898:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_proto[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5899:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_parent_ifindex[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:5938:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_owner[50]; data/network-manager-1.27.91/src/platform/nm-platform.c:5939:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_group[50]; data/network-manager-1.27.91/src/platform/nm-platform.c:5940:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_type[50]; data/network-manager-1.27.91/src/platform/nm-platform.c:6006:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_group[100]; data/network-manager-1.27.91/src/platform/nm-platform.c:6007:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_group6[100]; data/network-manager-1.27.91/src/platform/nm-platform.c:6008:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local[100]; data/network-manager-1.27.91/src/platform/nm-platform.c:6009:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_local6[100]; data/network-manager-1.27.91/src/platform/nm-platform.c:6010:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[25]; data/network-manager-1.27.91/src/platform/nm-platform.c:6011:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_limit[25]; data/network-manager-1.27.91/src/platform/nm-platform.c:6012:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_src_port[35]; data/network-manager-1.27.91/src/platform/nm-platform.c:6013:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dst_port[25]; data/network-manager-1.27.91/src/platform/nm-platform.c:6014:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_tos[25]; data/network-manager-1.27.91/src/platform/nm-platform.c:6015:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_ttl[25]; data/network-manager-1.27.91/src/platform/nm-platform.c:6016:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6106:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_sockaddr[NM_UTILS_INET_ADDRSTRLEN + 100]; data/network-manager-1.27.91/src/platform/nm-platform.c:6107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_endpoint[20 + sizeof(s_sockaddr)]; data/network-manager-1.27.91/src/platform/nm-platform.c:6108:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6109:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_keepalive[100]; data/network-manager-1.27.91/src/platform/nm-platform.c:6203:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_flags[TO_STRING_IFA_FLAGS_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:6204:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_address[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6205:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_peer[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6206:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[TO_STRING_DEV_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:6207:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_label[32]; data/network-manager-1.27.91/src/platform/nm-platform.c:6208:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_lft[30], str_pref[30], str_time[50], s_source[50]; data/network-manager-1.27.91/src/platform/nm-platform.c:6213:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_broadcast[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6351:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_flags[TO_STRING_IFA_FLAGS_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:6352:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_address[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6353:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_peer[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6354:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_lft[30], str_pref[30], str_time[50], s_source[50]; data/network-manager-1.27.91/src/platform/nm-platform.c:6355:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[TO_STRING_DEV_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:6460:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_network[INET_ADDRSTRLEN], s_gateway[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6461:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_pref_src[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6462:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[TO_STRING_DEV_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:6463:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_table[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:6464:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_scope[30], s_source[50]; data/network-manager-1.27.91/src/platform/nm-platform.c:6465:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_tos[32], str_window[32], str_cwnd[32], str_initcwnd[32], str_initrwnd[32], str_mtu[32]; data/network-manager-1.27.91/src/platform/nm-platform.c:6466:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_rtm_flags[_RTM_FLAGS_TO_STRING_MAXLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6467:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_type[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:6468:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_metric[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:6570:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_network[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6571:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_gateway[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6572:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_pref_src[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6573:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_src_all[INET6_ADDRSTRLEN + 40]; data/network-manager-1.27.91/src/platform/nm-platform.c:6574:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_src[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6575:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_type[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:6576:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_table[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:6577:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_pref[40]; data/network-manager-1.27.91/src/platform/nm-platform.c:6578:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_pref2[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:6579:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[TO_STRING_DEV_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:6580:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_source[50]; data/network-manager-1.27.91/src/platform/nm-platform.c:6581:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_window[32]; data/network-manager-1.27.91/src/platform/nm-platform.c:6582:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_cwnd[32]; data/network-manager-1.27.91/src/platform/nm-platform.c:6583:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_initcwnd[32]; data/network-manager-1.27.91/src/platform/nm-platform.c:6584:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_initrwnd[32]; data/network-manager-1.27.91/src/platform/nm-platform.c:6585:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_mtu[32]; data/network-manager-1.27.91/src/platform/nm-platform.c:6586:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_rtm_flags[_RTM_FLAGS_TO_STRING_MAXLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6587:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_metric[30]; data/network-manager-1.27.91/src/platform/nm-platform.c:6692:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nm-platform.c:6881:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ss_buf[60]; data/network-manager-1.27.91/src/platform/nm-platform.c:6948:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[TO_STRING_DEV_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:7085:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_dev[TO_STRING_DEV_BUF_SIZE]; data/network-manager-1.27.91/src/platform/nm-platform.c:7086:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char act_buf[300]; data/network-manager-1.27.91/src/platform/nm-platform.c:7187:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_mac[128], mac[128]; data/network-manager-1.27.91/src/platform/nm-platform.c:7188:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_spoof_check[64]; data/network-manager-1.27.91/src/platform/nm-platform.c:7189:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_trust[64]; data/network-manager-1.27.91/src/platform/nm-platform.c:7190:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_min_tx_rate[64]; data/network-manager-1.27.91/src/platform/nm-platform.c:7191:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_max_tx_rate[64]; data/network-manager-1.27.91/src/platform/nm-platform.c:7243:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_vid_end[64]; data/network-manager-1.27.91/src/platform/nm-platform.h:211:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[NMP_IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform.h:371:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[NMP_IFNAMSIZ]; data/network-manager-1.27.91/src/platform/nm-platform.h:629:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iifname[NMP_IFNAMSIZ]; /* FRA_IIFNAME */ data/network-manager-1.27.91/src/platform/nm-platform.h:630:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oifname[NMP_IFNAMSIZ]; /* FRA_OIFNAME */ data/network-manager-1.27.91/src/platform/nm-platform.h:712:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdata[32]; data/network-manager-1.27.91/src/platform/nm-platform.h:1514:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *nm_platform_if_indextoname(NMPlatform *self, data/network-manager-1.27.91/src/platform/nm-platform.h:1516:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out_ifname[static 16 /* IFNAMSIZ */]); data/network-manager-1.27.91/src/platform/nmp-netns.c:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bb[200]; data/network-manager-1.27.91/src/platform/nmp-netns.c:77:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf[20]; \ data/network-manager-1.27.91/src/platform/nmp-netns.c:315:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd_net = open(PROC_SELF_NS_NET, O_RDONLY | O_CLOEXEC); data/network-manager-1.27.91/src/platform/nmp-netns.c:327:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd_mnt = open(PROC_SELF_NS_MNT, O_RDONLY | O_CLOEXEC); data/network-manager-1.27.91/src/platform/nmp-netns.c:350:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/network-manager-1.27.91/src/platform/nmp-netns.c:456:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[100]; data/network-manager-1.27.91/src/platform/nmp-netns.c:661:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(filename, O_RDONLY | O_CLOEXEC)) == -1) { data/network-manager-1.27.91/src/platform/nmp-object.c:170:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, src_len); data/network-manager-1.27.91/src/platform/nmp-object.c:215:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, src_len); data/network-manager-1.27.91/src/platform/nmp-object.c:222:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/nmp-object.c:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_scope_id[40]; data/network-manager-1.27.91/src/platform/nmp-object.c:769:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->object, plobj, klass->sizeof_public); data/network-manager-1.27.91/src/platform/nmp-object.c:826:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->object, plobj, klass->sizeof_public); data/network-manager-1.27.91/src/platform/nmp-object.c:887:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nmp-object.c:978:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nmp-object.c:1042:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/nmp-object.c:1095:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _nm_unused char buf1[NM_UTILS_INET_ADDRSTRLEN]; \ data/network-manager-1.27.91/src/platform/nmp-object.c:1096:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _nm_unused char buf2[NM_UTILS_INET_ADDRSTRLEN]; \ data/network-manager-1.27.91/src/platform/nmp-object.c:1299:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dst->object, &src->object, klass->sizeof_data); data/network-manager-1.27.91/src/platform/nmp-object.h:436:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. obj = plobj ? (NMPObject *) (&(((char *) plobj)[-((int) G_STRUCT_OFFSET(NMPObject, object))])) data/network-manager-1.27.91/src/platform/tests/test-common.c:211:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:235:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[sizeof(_nm_utils_to_string_buffer)]; data/network-manager-1.27.91/src/platform/tests/test-common.c:574:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:666:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_src[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:667:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_network[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1039:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1040:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1053:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_peer[NM_UTILS_INET_ADDRSTRLEN + 50]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1287:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1288:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1432:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_gfw[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1433:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_mhm[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1434:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_mlmc[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1435:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_mlmi[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1436:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_mmi[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1437:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_mqi[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1438:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_mqii[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1439:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_msqc[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1440:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_msqi[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1441:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf_mqri[100]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1629:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1630:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1680:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1681:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1682:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encap[20]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1683:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tclass[20]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1746:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1747:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1748:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tclass[20]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1805:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1806:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1897:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:1898:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:2056:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:2057:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char group[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-common.c:2336:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char read_buf[1]; data/network-manager-1.27.91/src/platform/tests/test-common.c:2445:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p[1000]; data/network-manager-1.27.91/src/platform/tests/test-common.c:2452:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open(p, O_RDONLY | O_CLOEXEC); data/network-manager-1.27.91/src/platform/tests/test-common.c:2495:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("/proc/self/setgroups", "we"); data/network-manager-1.27.91/src/platform/tests/test-common.c:2502:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("/proc/self/uid_map", "we"); data/network-manager-1.27.91/src/platform/tests/test-common.c:2509:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("/proc/self/gid_map", "we"); data/network-manager-1.27.91/src/platform/tests/test-link.c:574:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[ETH_ALEN]; data/network-manager-1.27.91/src/platform/tests/test-link.c:637:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char mac[6] = {0x00, 0xff, 0x11, 0xee, 0x22, 0xdd}; data/network-manager-1.27.91/src/platform/tests/test-link.c:809:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, b, dst_len); data/network-manager-1.27.91/src/platform/tests/test-link.c:1151:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_addr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-link.c:1470:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/network-manager-1.27.91/src/platform/tests/test-link.c:2416:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/network-manager-1.27.91/src/platform/tests/test-link.c:2773:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[100]; data/network-manager-1.27.91/src/platform/tests/test-link.c:3109:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[600]; data/network-manager-1.27.91/src/platform/tests/test-link.c:3205:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const IFNAME[3] = { data/network-manager-1.27.91/src/platform/tests/test-link.c:3213:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_buf[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/tests/test-link.c:3309:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname_buf[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/tests/test-platform-general.c:58:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_PLATFORM_LINK_FLAGS2STR_MAX_LEN + 100]; data/network-manager-1.27.91/src/platform/tests/test-platform-general.c:103:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *const EXPECTED_BUFFER[3] = { data/network-manager-1.27.91/src/platform/tests/test-route.c:915:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/tests/test-route.c:916:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname2[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/tests/test-route.c:917:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/tests/test-route.c:1277:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saddr[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c:29:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _ifname_buf[IFNAMSIZ]; \ data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c:447:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info->bssid, nla_data(bss[NL80211_BSS_BSSID]), ETH_ALEN); data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c:467:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(info->ssid, ssid, ssid_len); data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-nl80211.c:525:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out_bssid, bss_info.bssid, ETH_ALEN); data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:151:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:164:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:204:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:234:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:273:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:287:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out_bssid, &(wrq.u.ap_addr.sa_data), ETH_ALEN); data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:297:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:434:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:479:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:510:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[IW_ESSID_MAX_SIZE + 1]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:511:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wifi/nm-wifi-utils-wext.c:697:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/network-manager-1.27.91/src/platform/wpan/nm-wpan-utils.c:20:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _ifname_buf[IFNAMSIZ]; \ data/network-manager-1.27.91/src/ppp/nm-ppp-manager.c:607:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out_addr->s6_addr + 8, &iid, sizeof(iid)); data/network-manager-1.27.91/src/ppp/nm-pppd-plugin.c:125:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_name[IF_NAMESIZE]; data/network-manager-1.27.91/src/ppp/nm-pppd-plugin.c:275:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iid, &eui, sizeof(eui)); data/network-manager-1.27.91/src/settings/nm-agent-manager.c:71:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix1[32]; \ data/network-manager-1.27.91/src/settings/nm-agent-manager.c:72:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix2[128]; \ data/network-manager-1.27.91/src/settings/nm-secret-agent.c:69:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _prefix[64]; \ data/network-manager-1.27.91/src/settings/nm-secret-agent.c:676:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_subject[64]; data/network-manager-1.27.91/src/settings/nm-secret-agent.c:677:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf_caps[150]; data/network-manager-1.27.91/src/settings/nm-settings-connection.c:140:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[128]; \ data/network-manager-1.27.91/src/settings/nm-settings-connection.c:2095:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[255], buf2[255]; data/network-manager-1.27.91/src/settings/nm-settings-connection.c:2232:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[60]; data/network-manager-1.27.91/src/settings/nm-settings-connection.c:2483:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/network-manager-1.27.91/src/settings/nm-settings-utils.c:115:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbuh->uuid_data, uuid, l); data/network-manager-1.27.91/src/settings/nm-settings.c:196:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sett_conn_entry->_uuid_data, uuid, l_p_1); data/network-manager-1.27.91/src/settings/nm-settings.c:3087:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list, list_cached, sizeof(list[0]) * ((gsize) len + 1)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:124:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags_key[250]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:148:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags_key[250]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:685:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:714:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:715:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix_tag[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:722:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inet_buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1014:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1015:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1401:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1402:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netmask_tag[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1410:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inet_buf[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:1976:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2491:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2623:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2747:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[255]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:5085:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) equals)[0] = '\0'; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:6385:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_device, device, i + 1); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:6400:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p_path, IFUP_PATH_PREFIX, NM_STRLEN(IFUP_PATH_PREFIX)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.h:149:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *const _nm_ethtool_ifcfg_names[_NM_ETHTOOL_ID_NUM]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:199:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secret_name[100]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secret_flags[sizeof(secret_name) + NM_STRLEN("_FLAGS")]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:653:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:689:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:904:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[33]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:907:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, ssid_data, ssid_len); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:963:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1381:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_buf[50], *s_buf_ptr; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1870:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prop[NM_STRLEN("DCB_xxxxxxxxxxxxxxxxxxxxxxx_yyyyyyyyyyyyyyyyyyyy")]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1885:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prop[NM_STRLEN("DCB_xxxxxxxxxxxxxxxxxxxxxxx_yyyyyyyyyyyyyyyyyyyy")]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1904:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[9]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:1925:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[9]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2208:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[100]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2258:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lock_name[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2312:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2316:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_key[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2317:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gw_key[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2318:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netmask_key[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2319:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char metric_key[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2320:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char options_key[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2466:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[32]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2495:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2640:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2658:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tag[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2739:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:3133:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[64]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:881:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(name, O_RDWR | O_CLOEXEC); /* NOT O_CREAT */ data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:884:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(name, O_RDONLY | O_CLOEXEC); /* NOT O_CREAT */ data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:1421:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_DECIMAL_STR_MAX(value)]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:1489:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). s->fd = open(s->fileName, O_WRONLY | O_CREAT | O_CLOEXEC, mode); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:116:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char NO_EXPECTED[1]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:612:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33}; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:666:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * expected_mac_blacklist[3] = {"00:16:41:11:22:88", data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:719:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33}; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:838:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x11, 0x22, 0x33, 0x44, 0xee}; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:984:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x11, 0x22, 0x33, 0x44, 0xee}; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2271:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[256]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2591:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33}; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2801:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33}; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3162:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33}; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:4015:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cexpected[NM_STRLEN(TEST_IFCFG_DIR) + 100]; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:8422:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x16, 0x41, 0x11, 0x22, 0x33}; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:9274:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[INFINIBAND_ALEN] = {0x80, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:47:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) ifb->name, name, l_name); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:49:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) ifb->type, type, l_type); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:72:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) ifd->key, key, l_key); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:74:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) ifd->data, data, l_data); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[255]; data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:118:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inp = fopen(eni_file, "re"); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:128:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token[128]; /* 255 chars can only be split into 127 tokens */ data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:129:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; /* large enough to join previously split tokens */ data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:453:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). netmask_int = atoi(netmask_v); data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *dirname_libs[2]; data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.c:767:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strbuf[100]; data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-plugin.c:894:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strbuf[100]; data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[250]; data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:226:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x11, 0x22, 0x33, 0x44, 0x55}; data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:642:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac_address[ETH_ALEN] = {0x00, 0x11, 0xaa, 0xbb, 0xcc, 0x55}; data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:671:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_mac[ETH_ALEN] = {0x00, 0x11, 0xaa, 0xbb, 0xcc, 0x55}; data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:672:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_cloned_mac[ETH_ALEN] = {0x00, 0x16, 0xaa, 0xbb, 0xcc, 0xfe}; data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:158:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opt->value, value, len); data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:165:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[255]; data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:167:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[0], opt->value, opt->len > 254 ? 254 : opt->len); data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:330:78: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_variant_builder_add(&builder, "{sv}", key, g_variant_new_int32(atoi(option->value))); data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:402:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:717:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(digest, md5, 13); data/network-manager-1.27.91/src/supplicant/nm-supplicant-interface.c:199:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _sbuf[255]; \ data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.c:464:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[NMP_IFNAMSIZ]; data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.c:506:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[NMP_IFNAMSIZ]; data/network-manager-1.27.91/src/supplicant/nm-supplicant-manager.c:636:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[NMP_IFNAMSIZ]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.c:119:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arp.arp_sha, ha, ETH_ALEN); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.c:120:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arp.arp_tpa, &pa, sizeof(pa)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/arp-util.c:123:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arp.arp_spa, &pa, sizeof(pa)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:84:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(duid->llt.haddr, addr, addr_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:105:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(duid->ll.haddr, addr, addr_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:156:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&duid->raw.data, &machine_id, sizeof(machine_id)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:180:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifindex_str[1 + DECIMAL_STR_MAX(int)]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-network.c:111:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(link->ll.sll_addr, bcast_addr, mac_addr_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-network.c:137:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ð_mac, mac_addr, ETH_ALEN); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c:64:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&options[*offset + 1], *s, len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c:101:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&options[*offset + 2], p->data, p->length); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-packet.c:64:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf_tail, buf_64, len % sizeof(uint64_t)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:106:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p + 8, options->data, options->length); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:152:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*buf, (char*) ia + iaid_offset, len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:163:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*buf, &addr->iaaddr, sizeof(addr->iaaddr)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:225:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p[offset + 2], *s, len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:265:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p[offset + 2], *s, len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:289:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&option->data, &pd->ia_pd, sizeof(pd->ia_pd)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:298:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&prefix_opt->iapdprefix, &prefix->iapdprefix, sizeof(struct iapdprefix)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:310:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&prefix_opt->iapdprefix, &hint_pd_prefix->iapdprefix, sizeof(struct iapdprefix)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:512:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ia->ia_ta.id, iaoption->data, sizeof(ia->ia_ta)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:639:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*addrs + count, optval, optlen); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c:183:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&n->source_address, h.ether_shost, sizeof(struct ether_addr)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c:184:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&n->destination_address, h.ether_dhost, sizeof(struct ether_addr)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c:654:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(LLDP_NEIGHBOR_RAW(n), raw, raw_size); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/lldp-neighbor.c:742:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(oui, d, 3); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:74:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v + sizeof(sd_id128_t), name, l); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:156:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *const wifi_iftype_table[NL80211_IFTYPE_MAX+1] = { data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:678:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:739:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[INET6_ADDRSTRLEN]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:793:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:323:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&client->mac_addr, addr, addr_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:398:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&client->client_id.raw.data, data, data_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:457:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&client->client_id.ns.duid.raw.data, duid, duid_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:799:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&packet->dhcp.chaddr, &client->mac_addr, ETH_ALEN); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:1628:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_string[FORMAT_TIMESPAN_MAX]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:1743:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_string[FORMAT_TIMESPAN_MAX]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:2073:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&release->dhcp.chaddr, &client->mac_addr, client->mac_addr_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:2107:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&release->dhcp.chaddr, &client->mac_addr, client->mac_addr_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c:332:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret, option, 4); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c:522:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&route->dst_addr.s_addr, option, dst_octets); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c:880:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-lease.c:1016:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[STRLEN("OPTION_000")+1]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:97:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * dhcp6_message_type_table[_DHCP6_MESSAGE_MAX] = { data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:115:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * dhcp6_message_status_table[_DHCP6_STATUS_MAX] = { data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:209:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&client->mac_addr, addr, addr_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:286:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&client->duid.raw.data, duid, duid_len); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:947:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_string[FORMAT_TIMESPAN_MAX]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:1565:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_string[FORMAT_TIMESPAN_MAX]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-lease.c:151:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, &lease->addr_iter->iaaddr.address, data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-lease.c:180:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prefix, &lease->prefix_iter->iapdprefix.address, data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-ipv4acd.c:210:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ts[FORMAT_TIMESPAN_MAX]; data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-lldp.c:25:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const lldp_event_table[_SD_LLDP_EVENT_MAX] = { data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:1861:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(path, O_PATH|O_CLOEXEC| data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:3685:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[ELEMENTSOF(e->delays) * DECIMAL_STR_MAX(unsigned) + 1], *p; data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:17:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *id128_to_uuid_string(sd_id128_t id, char s[static ID128_UUID_STRING_MAX]) { data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:17:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *id128_to_uuid_string(sd_id128_t id, char s[static ID128_UUID_STRING_MAX]) { data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:85:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[36 + 2]; data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:138:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(p, O_RDONLY|O_CLOEXEC|O_NOCTTY); data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:147:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[36 + 2]; data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:183:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(p, O_WRONLY|O_CREAT|O_CLOEXEC|O_NOCTTY|O_TRUNC, 0444); data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.h:13:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *id128_to_uuid_string(sd_id128_t id, char s[static ID128_UUID_STRING_MAX]); data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.h:13:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *id128_to_uuid_string(sd_id128_t id, char s[static ID128_UUID_STRING_MAX]); data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/sd-id128.c:24:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _public_ char *sd_id128_to_string(sd_id128_t id, char s[_SD_ARRAY_STATIC SD_ID128_STRING_MAX]) { data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/sd-id128.c:24:50: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. _public_ char *sd_id128_to_string(sd_id128_t id, char s[_SD_ARRAY_STATIC SD_ID128_STRING_MAX]) { data/network-manager-1.27.91/src/systemd/src/systemd/sd-id128.h:38:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sd_id128_to_string(sd_id128_t id, char s[_SD_ARRAY_STATIC SD_ID128_STRING_MAX]); data/network-manager-1.27.91/src/systemd/src/systemd/sd-id128.h:38:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sd_id128_to_string(sd_id128_t id, char s[_SD_ARRAY_STATIC SD_ID128_STRING_MAX]); data/network-manager-1.27.91/src/tests/test-core.c:41:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, nbytes); data/network-manager-1.27.91/src/tests/test-core.c:322:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[NM_UTILS_SYSCTL_IP_CONF_PATH_BUFSIZE]; data/network-manager-1.27.91/src/tests/test-core.c:1674:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NM_STRLEN(BUF_ORIG) + 1]; data/network-manager-1.27.91/src/tests/test-core.c:1675:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[NM_STRLEN(BUF_ORIG) + 1]; data/network-manager-1.27.91/src/tests/test-core.c:2265:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine_id_str[33]; data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:213:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __prefix[__NMLOG_prefix_buf_len]; \ data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:1005:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:1006:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b2[NM_UTILS_INET_ADDRSTRLEN]; data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:1299:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, bytes, len); data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:2260:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * vpn_argv[4]; data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:2265:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char env_log_level[NM_STRLEN("NM_VPN_LOG_LEVEL=") + 100]; data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:2266:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char env_log_syslog[NM_STRLEN("NM_VPN_LOG_SYSLOG=") + 10]; data/network-manager-1.27.91/clients/cli/common.c:968:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int subst_len = strlen(subst); data/network-manager-1.27.91/clients/cli/common.c:1048:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/network-manager-1.27.91/clients/cli/connections.c:3665:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). master = master + strlen("ifname/"); data/network-manager-1.27.91/clients/cli/connections.c:3669:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). master = master + strlen("uuid/"); data/network-manager-1.27.91/clients/cli/connections.c:3673:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). master = master + strlen("id/"); data/network-manager-1.27.91/clients/cli/connections.c:5754:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (max < strlen(id)) data/network-manager-1.27.91/clients/cli/connections.c:5755:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). max = strlen(id); data/network-manager-1.27.91/clients/cli/connections.c:5897:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/network-manager-1.27.91/clients/cli/devices.c:1458:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < strlen(ret); i++) { data/network-manager-1.27.91/clients/cli/devices.c:3743:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!bssid1_arr && strlen(param_user) > 32) { data/network-manager-1.27.91/clients/cli/devices.c:3777:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_variant_new_fixed_array(G_VARIANT_TYPE_BYTE, param_user, strlen(param_user), 1)); data/network-manager-1.27.91/clients/cli/devices.c:3886:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). GBytes *ssid = g_bytes_new(param_user, strlen(param_user)); data/network-manager-1.27.91/clients/cli/devices.c:3998:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ssid) > 32) data/network-manager-1.27.91/clients/cli/devices.c:4000:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid_bytes = g_bytes_new(ssid, strlen(ssid)); data/network-manager-1.27.91/clients/cli/devices.c:4296:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(*argv) > 32) { data/network-manager-1.27.91/clients/cli/devices.c:4301:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid_bytes = g_bytes_new(*argv, strlen(*argv)); data/network-manager-1.27.91/clients/cli/devices.c:4541:70: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_variant_new_fixed_array(G_VARIANT_TYPE_BYTE, ssid, strlen(ssid), 1)); data/network-manager-1.27.91/clients/cli/general.c:716:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(prefix); data/network-manager-1.27.91/clients/cli/utils.c:408:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = start + strlen(start); data/network-manager-1.27.91/clients/cli/utils.c:514:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(s); data/network-manager-1.27.91/clients/cli/utils.c:567:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = start + strlen(start); data/network-manager-1.27.91/clients/cli/utils.c:1252:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width1 = strlen(header_name); data/network-manager-1.27.91/clients/cli/utils.c:1273:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width1 = strlen(title); data/network-manager-1.27.91/clients/cli/utils.c:1333:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width1 = strlen(prefix); data/network-manager-1.27.91/clients/cli/utils.c:1358:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width1 = strlen(text); data/network-manager-1.27.91/clients/cli/utils.c:1429:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rb = read(STDIN_FILENO, buf, sizeof(buf)); data/network-manager-1.27.91/clients/cli/utils.c:1609:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width1 = strlen(header_name); data/network-manager-1.27.91/clients/cli/utils.c:1657:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width1 = strlen(tmp); data/network-manager-1.27.91/clients/cli/utils.c:1682:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width1 = strlen(tmp); data/network-manager-1.27.91/clients/cli/utils.c:1731:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width1 = strlen(value); data/network-manager-1.27.91/clients/cli/utils.c:1737:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(value) > 0 ? value : not_set_str); data/network-manager-1.27.91/clients/cloud-setup/nm-cloud-setup-utils.c:526:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return memmem(mem_data, mem_size, needle, strlen(needle)); data/network-manager-1.27.91/clients/cloud-setup/nm-cloud-setup-utils.c:552:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(needle); data/network-manager-1.27.91/clients/common/nm-client-utils.c:190:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). input_ln = strlen(input); data/network-manager-1.27.91/clients/common/nm-client-utils.c:192:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p_len = strlen(*p); data/network-manager-1.27.91/clients/common/nm-client-utils.c:235:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(cmd); data/network-manager-1.27.91/clients/common/nm-client-utils.c:236:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!len || len > strlen(pattern)) data/network-manager-1.27.91/clients/common/nm-client-utils.c:876:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(l_hash_val) != l_hash_val_len) { data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:301:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_len = strlen(text); data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:553:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_string_append_len(str, i_name, strlen(i_name) + 1); data/network-manager-1.27.91/clients/common/nm-meta-setting-access.c:557:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_string_append_len(str, right, strlen(right) + 1); data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:123:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = nm_strndup_a(200, str, strlen(str), &str_clone_free); data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:472:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (c_len != strlen(contents)) { data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:554:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (c_len != strlen(contents)) { data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2104:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) > 32) { data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2109:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(value, strlen(value)); data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2562:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_len = text ? strlen(text) : 0; data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:2672:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_len = text ? strlen(text) : 0; data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:3057:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!NM_IN_SET(strlen(value), 5, 6)) { data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:3156:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(str->str) == str->len); data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:3243:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) > 1 && matches(value, "static")) { data/network-manager-1.27.91/clients/common/nm-meta-setting-desc.c:4120:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). idx = property_info->property_name[strlen(property_info->property_name) - 1] - '0'; data/network-manager-1.27.91/clients/common/nm-polkit-listener.c:396:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_str_buf_init(&request->out_buffer, strlen(response) + 2u, TRUE); data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:495:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmp) - NM_STRLEN("." NM_WIREGUARD_PEER_ATTR_PRESHARED_KEY)); data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:1060:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). request_id_setting_name = &request_id[strlen(request_id) - strlen(setting_name)]; data/network-manager-1.27.91/clients/common/nm-secret-agent-simple.c:1060:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). request_id_setting_name = &request_id[strlen(request_id) - strlen(setting_name)]; data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:179:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p1 = line + strlen(tag); data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:180:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p2 = line + strlen(line) - 1; data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:285:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(key) == key_len); data/network-manager-1.27.91/clients/common/nm-vpn-helpers.c:375:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize len = strlen(cstr) - NM_STRLEN(".conf"); data/network-manager-1.27.91/clients/common/qrcodegen.c:145:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t textLen = strlen(text); data/network-manager-1.27.91/clients/common/qrcodegen.c:990:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(digits); data/network-manager-1.27.91/clients/common/qrcodegen.c:1025:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(text); data/network-manager-1.27.91/clients/tui/newt/nmt-newt-utils.c:311:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = data ? strlen(data) : 0; data/network-manager-1.27.91/clients/tui/nmt-device-entry.c:122:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(words[1]); data/network-manager-1.27.91/clients/tui/nmt-page-wifi.c:145:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(text, strlen(text)); data/network-manager-1.27.91/dispatcher/nm-dispatcher-utils.c:31:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(line); data/network-manager-1.27.91/dispatcher/tests/test-dispatcher-envp.c:539:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpstr(&i_value[strlen("PATH=")], ==, g_getenv("PATH")); data/network-manager-1.27.91/libnm-core/nm-crypto-nss.c:431:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (guint8 *) g_utf8_to_utf16(password, strlen(password), NULL, &ucs2_chars, NULL); data/network-manager-1.27.91/libnm-core/nm-crypto.c:95:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p_len = strlen(cipher_name); data/network-manager-1.27.91/libnm-core/nm-crypto.c:101:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((gsize) p_len == strlen(info->name) data/network-manager-1.27.91/libnm-core/nm-crypto.c:119:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taglen = strlen(tag); data/network-manager-1.27.91/libnm-core/nm-crypto.c:212:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). start += strlen(start_tag); data/network-manager-1.27.91/libnm-core/nm-crypto.c:240:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(p, PROC_TYPE_TAG, strlen(PROC_TYPE_TAG))) { data/network-manager-1.27.91/libnm-core/nm-crypto.c:249:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(PROC_TYPE_TAG); data/network-manager-1.27.91/libnm-core/nm-crypto.c:258:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!strncmp(p, DEK_INFO_TAG, strlen(DEK_INFO_TAG))) { data/network-manager-1.27.91/libnm-core/nm-crypto.c:271:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(DEK_INFO_TAG); data/network-manager-1.27.91/libnm-core/nm-crypto.c:369:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). start += strlen(start_tag); data/network-manager-1.27.91/libnm-core/nm-crypto.c:421:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). start += strlen(start_tag); data/network-manager-1.27.91/libnm-core/nm-crypto.c:476:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). num = strlen(src); data/network-manager-1.27.91/libnm-core/nm-crypto.c:539:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(password), data/network-manager-1.27.91/libnm-core/nm-crypto.c:698:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). start += strlen(PEM_CERT_BEGIN); data/network-manager-1.27.91/libnm-core/nm-crypto.c:1057:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). enc_base64_len = strlen(enc_base64); data/network-manager-1.27.91/libnm-core/nm-crypto.c:1067:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ret_len += strlen(pem->pdata[i]); data/network-manager-1.27.91/libnm-core/nm-crypto.c:1073:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize line_l = strlen(line); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:540:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = i + strlen(&name[i]); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:541:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(len == strlen(name)); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:593:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = i + strlen(&key[i]); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile-utils.c:598:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(len == strlen(key)); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1257:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(&tmp_string[length]); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1443:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data_len = strlen(data); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1480:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path_len = strlen(path); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:1649:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val = g_bytes_new_take(path, strlen(path) + 1); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:2081:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_name_idx = key_name + strlen(key_name); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:4109:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(base); data/network-manager-1.27.91/libnm-core/nm-keyfile/nm-keyfile.c:4148:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.c:303:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(bin) != unescaped_len) { data/network-manager-1.27.91/libnm-core/nm-libnm-core-intern/nm-libnm-core-utils.c:328:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(item); data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:337:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val_len = strlen((char *) val_bin) + 1; data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:343:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val_len = strlen((char *) val_bin) + 1; data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2491:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((!priv->password || !strlen(priv->password)) data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2503:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!priv->pin || !strlen(priv->pin)) data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2749:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((!priv->identity || !strlen(priv->identity)) data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2750:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && (!priv->anonymous_identity || !strlen(priv->anonymous_identity))) { data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2760:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!strlen(priv->identity)) { data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2791:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((!priv->phase2_auth || !strlen(priv->phase2_auth)) data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2792:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && (!priv->phase2_autheap || !strlen(priv->phase2_autheap))) { data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2802:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!strlen(priv->phase2_auth)) { data/network-manager-1.27.91/libnm-core/nm-setting-8021x.c:2851:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!strlen(priv->identity)) { data/network-manager-1.27.91/libnm-core/nm-setting-cdma.c:130:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!strlen(priv->number)) { data/network-manager-1.27.91/libnm-core/nm-setting-cdma.c:139:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (priv->username && !strlen(priv->username)) { data/network-manager-1.27.91/libnm-core/nm-setting-connection.c:154:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ulen = strlen(str); data/network-manager-1.27.91/libnm-core/nm-setting-connection.c:1299:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(priv->mud_url) > 255) { data/network-manager-1.27.91/libnm-core/nm-setting-gsm.c:288:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize apn_len = strlen(priv->apn); data/network-manager-1.27.91/libnm-core/nm-setting-gsm.c:343:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize nid_len = strlen(priv->network_id); data/network-manager-1.27.91/libnm-core/nm-setting-gsm.c:395:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(priv->sim_operator_id); data/network-manager-1.27.91/libnm-core/nm-setting-ip-config.c:2250:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(out_xifname, bin, 16 /* IFNAMSIZ */); data/network-manager-1.27.91/libnm-core/nm-setting-macsec.c:235:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(key) != (gsize) req_len) { data/network-manager-1.27.91/libnm-core/nm-setting-pppoe.c:132:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!strlen(priv->username)) { data/network-manager-1.27.91/libnm-core/nm-setting-pppoe.c:141:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (priv->service && !strlen(priv->service)) { data/network-manager-1.27.91/libnm-core/nm-setting-proxy.c:155:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(priv->pac_script) > 1 * 1024 * 1024) { data/network-manager-1.27.91/libnm-core/nm-setting-team.c:195:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_target_host = strlen(target_host) + 1; data/network-manager-1.27.91/libnm-core/nm-setting-team.c:335:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_target_host = strlen(target_host) + 1; data/network-manager-1.27.91/libnm-core/nm-setting-team.c:336:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_source_host = strlen(source_host) + 1; data/network-manager-1.27.91/libnm-core/nm-setting-user.c:94:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(key); data/network-manager-1.27.91/libnm-core/nm-setting-user.c:184:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(val); data/network-manager-1.27.91/libnm-core/nm-setting-vpn.c:485:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). secret_name = g_strndup(key_name, strlen(key_name) - NM_STRLEN("-flags")); data/network-manager-1.27.91/libnm-core/nm-setting-wimax.c:100:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(priv->network_name)) { data/network-manager-1.27.91/libnm-core/nm-setting-wired.c:813:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(v->value_str) > 200) { data/network-manager-1.27.91/libnm-core/nm-setting-wireguard.c:952:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(_secret_public_key) \ data/network-manager-1.27.91/libnm-core/nm-setting-wireless-security.c:980:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (priv->leap_username && !strlen(priv->leap_username)) { data/network-manager-1.27.91/libnm-core/nm-team-utils.c:2371:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(js_str) > 1 * 1024 * 1024) { data/network-manager-1.27.91/libnm-core/nm-utils.c:153:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_endpoint = strlen(endpoint) + 1; data/network-manager-1.27.91/libnm-core/nm-utils.c:158:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_host = strlen(host) + 1; data/network-manager-1.27.91/libnm-core/nm-utils.c:444:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(lang) > 2) { data/network-manager-1.27.91/libnm-core/nm-utils.c:1289:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). keylen = strlen(key); data/network-manager-1.27.91/libnm-core/nm-utils.c:1329:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). psklen = strlen(psk); data/network-manager-1.27.91/libnm-core/nm-utils.c:3212:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = s ? strlen(s) : 0; data/network-manager-1.27.91/libnm-core/nm-utils.c:3314:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_str_buf_append_len(&str, string1, strlen(string1) + 1u); data/network-manager-1.27.91/libnm-core/nm-utils.c:3319:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_str_buf_append_len(&str, s, strlen(s) + 1u); data/network-manager-1.27.91/libnm-core/nm-utils.c:4656:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len != strlen(bin)) { data/network-manager-1.27.91/libnm-core/nm-utils.c:5064:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(k1->data) + 1; data/network-manager-1.27.91/libnm-core/nm-utils.c:5088:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen(v1) + 1; data/network-manager-1.27.91/libnm-core/nm-utils.c:5092:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l2 = strlen(v2) + 1; data/network-manager-1.27.91/libnm-core/nm-utils.c:5311:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(str) - 1; data/network-manager-1.27.91/libnm-core/nm-utils.c:5771:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base64_key_len = strlen(base64_key); data/network-manager-1.27.91/libnm-core/tests/test-crypto.c:63:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (p = b64; p < (b64 + strlen (b64)); p += 64) { data/network-manager-1.27.91/libnm-core/tests/test-crypto.c:392:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(md5_tests[i].password), data/network-manager-1.27.91/libnm-core/tests/test-general.c:149:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_hash_update_mem(&h, str, strlen(str)); data/network-manager-1.27.91/libnm-core/tests/test-general.c:361:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s1 = &s1[strlen(str)]; data/network-manager-1.27.91/libnm-core/tests/test-general.c:363:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(&(words[i - 1])[strlen(words[i - 1])] < words[i]); data/network-manager-1.27.91/libnm-core/tests/test-general.c:377:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const gsize l_i = strlen(words[i]); data/network-manager-1.27.91/libnm-core/tests/test-general.c:450:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *s = &(words[i - 1])[strlen(words[i - 1]) + 1]; data/network-manager-1.27.91/libnm-core/tests/test-general.c:839:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize len = strlen(str); data/network-manager-1.27.91/libnm-core/tests/test-general.c:968:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(options->pdata[options->len - 1]) > 0u) { data/network-manager-1.27.91/libnm-core/tests/test-general.c:5544:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/libnm-core/tests/test-general.c:5618:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/libnm-core/tests/test-general.c:6723:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (endpoint[0] && endpoint[strlen(endpoint) - 1] != ' ') { data/network-manager-1.27.91/libnm-core/tests/test-general.c:6888:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(strlen(b) < buf_len); data/network-manager-1.27.91/libnm-core/tests/test-general.c:6994:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _test_uuid(uuid_type, expected_uuid, str, strlen(str), type_args); data/network-manager-1.27.91/libnm-core/tests/test-general.c:7592:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define _test_uuid(expected_uuid, str, strlen, ...) \ data/network-manager-1.27.91/libnm-core/tests/test-general.c:7593:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __test_uuid(expected_uuid, str, strlen, _nm_utils_uuid_generate_from_strings(__VA_ARGS__, NULL)) data/network-manager-1.27.91/libnm-core/tests/test-general.c:7685:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val = str + strlen(sign); data/network-manager-1.27.91/libnm-core/tests/test-general.c:8838:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(l, ==, strlen(str)); data/network-manager-1.27.91/libnm-core/tests/test-general.c:8846:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (expected && l == strlen(expected)) { data/network-manager-1.27.91/libnm-core/tests/test-general.c:8893:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (str_len == strlen(str)) { data/network-manager-1.27.91/libnm-core/tests/test-general.c:10042:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(strlen(result) == l); data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:121:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(data); data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:139:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). success = g_key_file_load_from_data(keyfile, str, strlen(str), G_KEY_FILE_NONE, &error); data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:275:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pfile = g_bytes_new(puri, strlen(puri) + 1); data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:332:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(val_len == -1 || strlen(path) == val_len); data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:559:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(nm_setting_802_1x_get_ca_cert_path(s_8021x)), ==, 499); data/network-manager-1.27.91/libnm-core/tests/test-keyfile.c:571:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(nm_setting_802_1x_get_private_key_path(s_8021x)), ==, 505); data/network-manager-1.27.91/libnm-core/tests/test-setting.c:167:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(l, ==, strlen(path) + NM_STRLEN(NM_SETTING_802_1X_CERT_SCHEME_PREFIX_PATH) + 1); data/network-manager-1.27.91/libnm-core/tests/test-setting.c:170:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(NM_SETTING_802_1X_CERT_SCHEME_PREFIX_PATH)) data/network-manager-1.27.91/libnm-core/tests/test-setting.c:172:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(NM_SETTING_802_1X_CERT_SCHEME_PREFIX_PATH); data/network-manager-1.27.91/libnm-core/tests/test-setting.c:173:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(memcmp(p, path, strlen(path)) == 0); data/network-manager-1.27.91/libnm-core/tests/test-setting.c:174:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(path); data/network-manager-1.27.91/libnm/nm-libnm-utils.c:172:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *eow = &p[strlen(ignored_phrases[i])]; data/network-manager-1.27.91/libnm/nm-libnm-utils.c:177:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(p, eow, strlen(eow) + 1); /* +1 for the \0 */ data/network-manager-1.27.91/libnm/nm-libnm-utils.c:206:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(p); data/network-manager-1.27.91/libnm/nm-secret-agent-old.c:1072:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). id_len = strlen(identifier); data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:779:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nr = read(fd, &c, 1); data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:809:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strncmp(line->str, DATA_KEY_TAG, strlen(DATA_KEY_TAG)) == 0) { data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:814:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key = g_string_new(line->str + strlen(DATA_KEY_TAG)); data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:817:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strncmp(line->str, DATA_VAL_TAG, strlen(DATA_VAL_TAG)) == 0) { data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:824:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val = g_string_new(line->str + strlen(DATA_VAL_TAG)); data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:826:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strncmp(line->str, SECRET_KEY_TAG, strlen(SECRET_KEY_TAG)) == 0) { data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:831:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key = g_string_new(line->str + strlen(SECRET_KEY_TAG)); data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:834:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strncmp(line->str, SECRET_VAL_TAG, strlen(SECRET_VAL_TAG)) == 0) { data/network-manager-1.27.91/libnm/nm-vpn-service-plugin.c:841:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val = g_string_new(line->str + strlen(SECRET_VAL_TAG)); data/network-manager-1.27.91/libnm/tests/test-libnm.c:2883:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(strlen(sp->name) > 0); data/network-manager-1.27.91/shared/n-acd/src/util/timer.c:87:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(timer->fd, &v, sizeof(v)); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:862:91: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = n_dhcp4_outgoing_append(message, N_DHCP4_OPTION_ERROR_MESSAGE, error, strlen(error) + 1); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-c-connection.c:967:91: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = n_dhcp4_outgoing_append(message, N_DHCP4_OPTION_ERROR_MESSAGE, error, strlen(error) + 1); data/network-manager-1.27.91/shared/n-dhcp4/src/n-dhcp4-client.c:677:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(client->fd_timer, &v, sizeof(v)); data/network-manager-1.27.91/shared/n-dhcp4/src/util/socket.c:116:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(ifname)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-glib.h:479:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytes = g_bytes_new_take(string, strlen(string) + 1); data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h:288:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_hash_update_mem(state, str, strlen(str)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-hash-utils.h:300:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_hash_update(state, str, strlen(str) + 1); data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:357:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(contents); data/network-manager-1.27.91/shared/nm-glib-aux/nm-io-utils.c:468:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n_read = read(fd, &((nm_str_buf_get_str_unsafe(out_string))[out_string->len]), buf_available); data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.c:126:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _gstr_append_string_len(gstr, str, strlen(str)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-json-aux.c:162:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(JANSSON_SONAME) > 0); data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c:81:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_filename = strlen(filename); data/network-manager-1.27.91/shared/nm-glib-aux/nm-keyfile-aux.c:82:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_group = strlen(group_name); data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1364:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(str); data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1384:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(_out_str_free_ssac || ((alloca_maxlen) > (str ? strlen(str) : 0u))); \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1390:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize _l = strlen(_str_ssac); \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1408:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (g_ascii_isspace(str[0]) || g_ascii_isspace(str[strlen(str) - 1])) data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1448:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(suffix) == NM_STRLEN(suffix)); \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1450:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (_str_has_suffix && ((_l = strlen(_str_has_suffix)) >= NM_STRLEN(suffix)) \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1459:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(suffix) == NM_STRLEN(suffix)); \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1461:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (_str_has_suffix && ((_l = strlen(_str_has_suffix)) > NM_STRLEN(suffix)) \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1566:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, str, len); data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1690:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const gsize _strlen_trunc = NM_MIN(strlen(_str), _trunc_at); \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-macros-internal.h:1750:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const gsize _name_len = strlen(_name); \ data/network-manager-1.27.91/shared/nm-glib-aux/nm-ref-string.h:20:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return cstr ? nm_ref_string_new_len(cstr, strlen(cstr)) : NULL; data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.c:54:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(secret); data/network-manager-1.27.91/shared/nm-glib-aux/nm-secret-utils.c:75:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(secret); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:835:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = nm_memdup_maybe_a(300, text, strlen(text) + 1, &s_free); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1750:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s_last = &s[strlen(s) - 1]; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1826:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str_len = strlen(str); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:1926:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(ret) == j); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2053:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str_out = g_new(char, strlen(str) + 1); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2639:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2720:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(str); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2795:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buflen = strlen(str); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:2890:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert((!res && len == 0) || (strlen(res) <= len)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3020:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). k = read(fd, p, nbytes); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:3642:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(strv[i]) + 1u; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:4502:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_len = strlen(hexstr) / 2 + 3; data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:4618:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). q = string + strlen(string); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5343:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dest = ret = g_malloc(strlen(src) * 2 + 1); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5481:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = strlen(name); data/network-manager-1.27.91/shared/nm-glib-aux/nm-shared-utils.c:5493:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(n); data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h:236:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_str_buf_append_len(strbuf, str, strlen(str)); data/network-manager-1.27.91/shared/nm-glib-aux/nm-str-buf.h:244:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return nm_str_buf_append_len0(strbuf, str, strlen(str)); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:200:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(input) + 1; data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:203:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(dup) < 10) data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:216:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(strlen(dup) <= l); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:221:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(input) < l) data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:222:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(nm_utils_memeqzero(&dup[strlen(input)], l - strlen(input))); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:222:70: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(nm_utils_memeqzero(&dup[strlen(input)], l - strlen(input))); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:349:35: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #define _STRV_CMP(a1, l1, a2, l2, equal) \ data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:369:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (equal) { \ data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:436:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(!s4 || strlen(s4) <= strlen(str)); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:436:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(!s4 || strlen(s4) <= strlen(str)); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:437:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s4 && s4 == &str[strlen(str) - strlen(s4)]) { data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:437:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s4 && s4 == &str[strlen(str) - strlen(s4)]) { data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:440:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (s4 && strlen(s4) >= 10) { data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:504:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(str_hex), ==, expected_strlen); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:516:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(strlen(str_hex) >= 5); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:604:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(s1->len, ==, strlen("hallo")); data/network-manager-1.27.91/shared/nm-glib-aux/tests/test-shared-general.c:619:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(s2->len, >, strlen(s2->str)); data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:335:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(prefix) == NM_STRLEN(prefix)); \ data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:345:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(suffix) == NM_STRLEN(suffix)); \ data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:347:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (_str_has_suffix && ((_l = strlen(_str_has_suffix)) >= NM_STRLEN(suffix)) \ data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:367:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(suffix) == NM_STRLEN(suffix)); \ data/network-manager-1.27.91/shared/nm-std-aux/nm-std-aux.h:369:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (_str_has_suffix && ((_l = strlen(_str_has_suffix)) > NM_STRLEN(suffix)) \ data/network-manager-1.27.91/shared/nm-udev-aux/nm-udev-utils.c:56:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unescaped = g_malloc(l + strlen(p) + 1 - 3); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:399:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!g_ascii_strncasecmp(debug, "log-level=", strlen("log-level="))) { data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:401:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). log_level = c_log_level = g_strdup(&debug[strlen("log-level=")]); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:410:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!g_ascii_strncasecmp(debug, "log-domains=", strlen("log-domains="))) { data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:412:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). log_domains = c_log_domains = g_strdup(&debug[strlen("log-domains=")]); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:413:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!g_ascii_strncasecmp(debug, "sudo-cmd=", strlen("sudo-cmd="))) { data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:415:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sudo_cmd = g_strdup(&debug[strlen("sudo-cmd=")]); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:418:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!g_ascii_strncasecmp(debug, "p=", strlen("p="))) { data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:421:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_ptr_array_add(p_tests, g_strdup(&debug[strlen("p=")])); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:422:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!g_ascii_strncasecmp(debug, "s=", strlen("s="))) { data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:425:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_ptr_array_add(s_tests, g_strdup(&debug[strlen("s=")])); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1408:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(m && strlen(m) == sizeof(u) - 1); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1641:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(contents), ==, len); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:1657:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _size = strlen(_content); \ data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:2397:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(keyfile_str), data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:2468:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(_l, ==, strlen(_str)); \ data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:2678:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(d1), ==, d1_len); data/network-manager-1.27.91/shared/nm-utils/nm-test-utils.h:2679:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data_len = strlen(data); data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:57:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return env_name_is_valid_n(e, strlen(e)); data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:77:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(e) > sc_arg_max() - 3) data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:100:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(e) > sc_arg_max() - 1) data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:248:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(pattern); data/network-manager-1.27.91/shared/systemd/src/basic/env-util.c:465:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strv_env_get_n(l, name, strlen(name), 0); data/network-manager-1.27.91/shared/systemd/src/basic/env-util.h:32:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return replace_env_n(format, strlen(format), env, flags); data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:104:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return cescape_length(s, strlen(s)); data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:379:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ans = new(char, MIN(strlen(s), console_width) * 4 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:383:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memset(ans, '_', MIN(strlen(s), console_width) * 4); data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:384:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ans[MIN(strlen(s), console_width) * 4] = 0; data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:491:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = new(char, strlen(s)*2+1); data/network-manager-1.27.91/shared/systemd/src/basic/escape.c:520:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = new(char, (style == ESCAPE_POSIX) + 1 + strlen(s)*2 + 1 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/escape.h:55:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return cunescape_length(s, strlen(s), flags, ret); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:338:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(blob); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:428:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). k = read(fd, buf, size + 1); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:739:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t += strlen(pattern); data/network-manager-1.27.91/shared/systemd/src/basic/fileio.c:1248:13: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). k = fgetc(f); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:57:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(path); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:292:13: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). u = umask(0777); data/network-manager-1.27.91/shared/systemd/src/basic/fs-util.c:294:9: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(u); data/network-manager-1.27.91/shared/systemd/src/basic/hash-funcs.c:11:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). siphash24_compress(p, strlen(p) + 1, state); data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:125:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(p); data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:316:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(p); data/network-manager-1.27.91/shared/systemd/src/basic/hexdecoct.c:718:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(p); data/network-manager-1.27.91/shared/systemd/src/basic/hostname-util.c:245:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (sethostname(s, strlen(s)) < 0) data/network-manager-1.27.91/shared/systemd/src/basic/in-addr-util.c:418:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = x + strlen(x); data/network-manager-1.27.91/shared/systemd/src/basic/in-addr-util.c:419:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l -= strlen(x); data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c:39:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). l = read(fd, buf, sizeof(buf)); data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c:72:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). k = read(fd, p, nbytes); data/network-manager-1.27.91/shared/systemd/src/basic/io-util.c:315:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = iovw_put(iovw, x, strlen(x)); data/network-manager-1.27.91/shared/systemd/src/basic/io-util.h:72:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define IOVEC_INIT_STRING(string) IOVEC_INIT((char*) string, strlen(string)) data/network-manager-1.27.91/shared/systemd/src/basic/parse-util.c:255:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = e + strlen(table[i].suffix); data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:186:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = new(char, n_parents * 3 + strlen(t) + 1); data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:428:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lvalue, strlen(path), fatal ? "" : ", ignoring"); data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:563:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz += 1 + strlen(p); data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:819:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = k = strlen(path); data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:891:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) >= PATH_MAX) /* PATH_MAX is counted *with* the trailing NUL byte */ data/network-manager-1.27.91/shared/systemd/src/basic/path-util.c:936:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). k = strlen(filename); data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:136:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _l = strlen(_root) + 1 + strlen(_path) + 1; \ data/network-manager-1.27.91/shared/systemd/src/basic/path-util.h:136:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _l = strlen(_root) + 1 + strlen(_path) + 1; \ data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:244:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(nn, name, nn_size); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:283:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mm, name, mm_size); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:313:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(name); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:326:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). k = strlen(program_invocation_name); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:327:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(program_invocation_name, name, k); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:343:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). k = strlen(saved_argv[0]); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:344:25: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(saved_argv[0], name, k); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:353:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memzero(saved_argv[i], strlen(saved_argv[i])); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:499:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l += strlen(field); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:647:42: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). int get_process_umask(pid_t pid, mode_t *umask) { data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:652:16: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). assert(umask); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:661:30: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). return parse_mode(m, umask); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.c:882:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(field); data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:26:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _r_ = newa(char, STRLEN("/proc/self/") + strlen(_field_) + 1); \ data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:29:90: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _r_ = newa(char, STRLEN("/proc/") + DECIMAL_STR_MAX(pid_t) + 1 + strlen(_field_) + 1); \ data/network-manager-1.27.91/shared/systemd/src/basic/process-util.h:50:42: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). int get_process_umask(pid_t pid, mode_t *umask); data/network-manager-1.27.91/shared/systemd/src/basic/siphash24.h:68:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). siphash24_compress(in, strlen(in), state); data/network-manager-1.27.91/shared/systemd/src/basic/siphash24.h:76:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return siphash24(s, strlen(s) + 1, k); data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:714:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) >= ALTIFNAMSIZ) data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:717:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) >= IFNAMSIZ) data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:754:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) >= IFNAMSIZ) data/network-manager-1.27.91/shared/systemd/src/basic/socket-util.c:1133:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(path); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:47:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sl = strlen(s); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:48:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pl = strlen(postfix); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:68:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sl = strlen(s); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:69:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pl = strlen(postfix); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:94:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sl = strlen(s); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:95:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wl = strlen(word); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:133:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). a = strlen(s); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:156:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(x); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:166:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(t); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:637:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). old_len = strlen(old_string); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:638:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_len = strlen(new_string); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:640:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(text); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:718:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isz = _isz ? *_isz : strlen(*ibuf); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:848:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(t); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:904:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(s); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:935:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). b = strdup(x + strlen(sep)); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:983:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*p && s && strneq(*p, s, l) && (l > strlen(*p) || (*p)[l] == '\0')) data/network-manager-1.27.91/shared/systemd/src/basic/string-util.c:1023:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). explicit_bzero_safe(x, strlen(x)); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:89:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(prefix); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:99:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(prefix); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:123:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _len_ += strlen(_appendees_[_i_]); \ data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:168:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ellipsize_mem(s, strlen(s), length, percent); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:204:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(s); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:209:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, src, buf_len); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:217:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen(token); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:235:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen(token); data/network-manager-1.27.91/shared/systemd/src/basic/string-util.h:254:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *t = realloc(*p, strlen(*p) + 1); data/network-manager-1.27.91/shared/systemd/src/basic/strv.c:384:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). k = strlen(separator); data/network-manager-1.27.91/shared/systemd/src/basic/strv.c:397:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n += m + strlen(*s) * (1 + needs_escaping); data/network-manager-1.27.91/shared/systemd/src/basic/strv.c:731:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). z = strlen(*i); data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.c:46:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strnpcpy(dest, size, src, strlen(src)); data/network-manager-1.27.91/shared/systemd/src/basic/strxcpyx.c:99:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strnscpy(dest, size, src, strlen(src)); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:379:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(buf); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:387:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(buf); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:400:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tn = strlen(tm.tm_zone); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:508:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(p, "infinity", l-1); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:514:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(p, "0", l-1); data/network-manager-1.27.91/shared/systemd/src/basic/time-util.c:755:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). skip = strlen(day_nr[i].name); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:125:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = new(char, strlen(p) + 2 + strlen(extra) + 6 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:125:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = new(char, strlen(p) + 2 + strlen(extra) + 6 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:163:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = new(char, strlen(p) + 2 + strlen(extra) + 16 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:163:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = new(char, strlen(p) + 2 + strlen(extra) + 16 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:203:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = new(char, strlen(p) + 3 + strlen(extra) + 16 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/tmpfile-util.c:203:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = new(char, strlen(p) + 3 + strlen(extra) + 16 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/umask-util.h:11:9: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(*u & 0777); data/network-manager-1.27.91/shared/systemd/src/basic/umask-util.h:24:53: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). for (_cleanup_umask_ mode_t _saved_umask_ = umask(mask) | S_IFMT; \ data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c:183:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = s = malloc(strlen(str) * 4 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c:228:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = s = prev_s = malloc(strlen(str) * 4 + 1); data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c:271:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = mempcpy(s, UTF8_REPLACEMENT_CHARACTER, strlen(UTF8_REPLACEMENT_CHARACTER)); data/network-manager-1.27.91/shared/systemd/src/basic/utf8.c:284:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = mempcpy(s, "…", strlen("…")); data/network-manager-1.27.91/shared/systemd/src/basic/util.c:122:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(fd, contents, sizeof(contents)); data/network-manager-1.27.91/shared/systemd/src/basic/util.c:138:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(fd, contents, sizeof(contents)); data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:349:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(buffer); data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:525:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = a + strlen(a); data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:526:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). y = b + strlen(b); data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:989:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(name); data/network-manager-1.27.91/shared/systemd/src/shared/dns-domain.c:1016:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = dns_label_escape(name, strlen(name), escaped, sizeof(escaped)); data/network-manager-1.27.91/src/NetworkManagerUtils.c:1114:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(path <= &abs_filename[strlen(abs_filename)]); data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:332:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(object_path) + 1; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez-manager.c:761:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(bdaddr) + 1; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:702:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src_l = strlen(adapter) + 1; data/network-manager-1.27.91/src/devices/bluetooth/nm-bluez5-dun.c:703:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dst_l = strlen(remote) + 1; data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:278:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uuid ? strlen(uuid) + 1u : 0u); data/network-manager-1.27.91/src/devices/nm-device-wireguard.c:316:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uuid ? strlen(uuid) + 1u : 0u); data/network-manager-1.27.91/src/devices/nm-device.c:1562:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) stable_id, strlen(stable_id) + 1); data/network-manager-1.27.91/src/devices/nm-device.c:1563:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) iface, strlen(iface) + 1); data/network-manager-1.27.91/src/devices/nm-device.c:1573:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). iaid = nm_utils_create_dhcp_iaid(TRUE, (const guint8 *) iface, strlen(iface)); data/network-manager-1.27.91/src/devices/nm-device.c:1586:75: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). iaid = nm_utils_create_dhcp_iaid(TRUE, (const guint8 *) iface, strlen(iface)); data/network-manager-1.27.91/src/devices/nm-device.c:1774:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) stable_id, strlen(stable_id) + 1); data/network-manager-1.27.91/src/devices/nm-device.c:14568:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(b); data/network-manager-1.27.91/src/devices/wifi/nm-device-iwd.c:261:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(name, NM_MIN(32u, strlen(name))); data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:297:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize strsize = strlen(name) + 1; data/network-manager-1.27.91/src/devices/wifi/nm-iwd-manager.c:446:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_ssid = g_bytes_new(name, strlen(name)); data/network-manager-1.27.91/src/devices/wifi/nm-wifi-utils.c:881:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ssid_l == strlen(manf_defaults[i])) { data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:70:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid_b = g_bytes_new(ssid, strlen(ssid)); data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:121:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp = g_bytes_new(item->str, strlen(item->str)); data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:212:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp = g_bytes_new(ssid, strlen(ssid)); data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:1430:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_variant_new_fixed_array(G_VARIANT_TYPE_BYTE, ssid, strlen(ssid), 1)); data/network-manager-1.27.91/src/devices/wifi/tests/test-devices-wifi.c:1448:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(nm_utils_gbytes_equal_mem(bytes, ssid, strlen(ssid))); data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.c:112:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (mcc && strlen(mcc) && mnc && strlen(mnc)) { data/network-manager-1.27.91/src/devices/wwan/nm-service-providers.c:112:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (mcc && strlen(mcc) && mnc && strlen(mnc)) { data/network-manager-1.27.91/src/dhcp/nm-dhcp-client.c:825:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). check_val ? len : strlen(str_value), data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:77:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(ss); data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:251:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s[strlen(s) - 1] == ';') data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:252:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s[strlen(s) - 1] = '\0'; data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:281:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (ptr[0] == '\0' || strlen(ptr) + 1 > size) data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:386:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(p, TIMEOUT_TAG, strlen(TIMEOUT_TAG)) data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:387:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || !strncmp(p, RETRY_TAG, strlen(RETRY_TAG))) data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:390:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(p, CLIENTID_TAG, strlen(CLIENTID_TAG))) { data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:403:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(p, HOSTNAME4_TAG, strlen(HOSTNAME4_TAG)) == 0) data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:405:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(p, FQDN_TAG, strlen(FQDN_TAG)) == 0) data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:424:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(p, REQ_TAG, strlen(REQ_TAG))) { data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:426:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(REQ_TAG); data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:438:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(p, ALSOREQ_TAG, strlen(ALSOREQ_TAG))) { data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:440:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(ALSOREQ_TAG); data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:573:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(duid); data/network-manager-1.27.91/src/dhcp/nm-dhcp-dhclient-utils.c:636:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ((char *) p)[strlen(p) - 2] = '\0'; data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper.c:78:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(name, *p, strlen(*p)) == 0) data/network-manager-1.27.91/src/dhcp/nm-dhcp-helper.c:95:83: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_variant_new_fixed_array(G_VARIANT_TYPE_BYTE, val, strlen(val), 1)); data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1391:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(mud_url)); data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1420:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fqdn_len = strlen(hostname); data/network-manager-1.27.91/src/dhcp/nm-dhcp-nettools.c:1440:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(hostname)); data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:251:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!str || !strlen(str)) data/network-manager-1.27.91/src/dhcp/nm-dhcp-utils.c:755:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(client_id); data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:736:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). COMPARE_ID(nothex, TRUE, nothex, strlen(nothex)); data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:738:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). COMPARE_ID(somehex, TRUE, somehex, strlen(somehex)); data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:739:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). COMPARE_ID(nocolons, TRUE, nocolons, strlen(nocolons)); data/network-manager-1.27.91/src/dhcp/tests/test-dhcp-utils.c:740:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). COMPARE_ID(endcolon, TRUE, endcolon, strlen(endcolon)); data/network-manager-1.27.91/src/dns/nm-dns-manager.c:633:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(s); data/network-manager-1.27.91/src/initrd/nm-initrd-generator.c:172:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!g_file_set_contents(hostname_file, data, strlen(data), &error)) { data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c:828:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (vlanid = vlan + strlen(vlan); vlanid > vlan; vlanid--) { data/network-manager-1.27.91/src/initrd/nmi-cmdline-reader.c:889:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bus_id_len = strlen(bus_id); data/network-manager-1.27.91/src/main-utils.c:92:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write(fd, pid, strlen(pid)) < 0) { data/network-manager-1.27.91/src/main-utils.c:249:5: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(022); data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c:446:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(dns_server->domain) + 2; data/network-manager-1.27.91/src/ndisc/nm-lndp-ndisc.c:460:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uint8_t domain_len = strlen(dns_domain->domain); data/network-manager-1.27.91/src/nm-auth-utils.c:76:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(call->permission && strlen(call->permission) > 0); data/network-manager-1.27.91/src/nm-config-data.c:927:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dns_config->searches[i]) + 1); data/network-manager-1.27.91/src/nm-config-data.c:933:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dns_config->options[i]) + 1); data/network-manager-1.27.91/src/nm-config-data.c:944:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (guchar *) domain->name, strlen(domain->name) + 1); data/network-manager-1.27.91/src/nm-config-data.c:950:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(domain->servers[j]) + 1); data/network-manager-1.27.91/src/nm-config-data.c:956:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(domain->options[j]) + 1); data/network-manager-1.27.91/src/nm-config-data.c:1021:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). domain_prefix_len = strlen(domain_prefix); data/network-manager-1.27.91/src/nm-config-data.c:1600:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(prefix); data/network-manager-1.27.91/src/nm-config.c:245:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(new_value); data/network-manager-1.27.91/src/nm-config.c:1055:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_len = strlen(key); data/network-manager-1.27.91/src/nm-config.c:2436:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). connection_uuid_len = connection_uuid ? strlen(connection_uuid) + 1 : 0; data/network-manager-1.27.91/src/nm-config.c:2437:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). perm_hw_addr_fake_len = perm_hw_addr_fake ? strlen(perm_hw_addr_fake) + 1 : 0; data/network-manager-1.27.91/src/nm-config.c:2685:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fn_len = strlen(fn); data/network-manager-1.27.91/src/nm-connectivity.c:597:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(cb_data->concheck.response_good_cnt < strlen(response)); data/network-manager-1.27.91/src/nm-connectivity.c:599:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). response_len = strlen(response); data/network-manager-1.27.91/src/nm-core-utils.c:427:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). log_name_len = strlen(LOG_NAME_FMT) + 20 + strlen(log_name); data/network-manager-1.27.91/src/nm-core-utils.c:427:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). log_name_len = strlen(LOG_NAME_FMT) + 20 + strlen(log_name); data/network-manager-1.27.91/src/nm-core-utils.c:1753:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string_value = g_new(char, strlen(value) + 1); data/network-manager-1.27.91/src/nm-core-utils.c:1988:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize pattern_len = strlen(pattern); data/network-manager-1.27.91/src/nm-core-utils.c:2081:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parent_len = strlen(parent_iface); data/network-manager-1.27.91/src/nm-core-utils.c:2103:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_return_val_if_fail(strlen(parent_name) < IFNAMSIZ, NULL); data/network-manager-1.27.91/src/nm-core-utils.c:2609:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path += strlen(ifname); data/network-manager-1.27.91/src/nm-core-utils.c:2913:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) slen, strlen(slen)); data/network-manager-1.27.91/src/nm-core-utils.c:2919:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) machine_id_data->str, strlen(machine_id_data->str)); data/network-manager-1.27.91/src/nm-core-utils.c:3522:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (guchar *) stable_id_generated, strlen(stable_id_generated)); data/network-manager-1.27.91/src/nm-core-utils.c:3530:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(base64) == 28); data/network-manager-1.27.91/src/nm-core-utils.c:3542:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_string_append_printf(str, "=%zu{%s}", strlen(substitution), substitution); data/network-manager-1.27.91/src/nm-core-utils.c:3739:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) ifname, strlen(ifname) + 1); data/network-manager-1.27.91/src/nm-core-utils.c:3740:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) network_id, strlen(network_id) + 1); data/network-manager-1.27.91/src/nm-core-utils.c:3916:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) (ifname ?: ""), ifname ? (strlen(ifname) + 1) : 1); data/network-manager-1.27.91/src/nm-core-utils.c:3917:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guchar *) stable_id, strlen(stable_id) + 1); data/network-manager-1.27.91/src/nm-dbus-manager.c:549:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(sender) + 1; data/network-manager-1.27.91/src/nm-dcb.c:318:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (errmsg && strlen(errmsg)) ? errmsg : outmsg); data/network-manager-1.27.91/src/nm-dispatcher.c:98:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_log_ifname = log_ifname ? (strlen(log_ifname) + 1) : 0u; data/network-manager-1.27.91/src/nm-dispatcher.c:99:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_log_con_uuid = log_con_uuid ? (strlen(log_con_uuid) + 1) : 0u; data/network-manager-1.27.91/src/nm-firewall-manager.c:294:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && NM_IN_SET(error->message[strlen(non_error)], '\0', ':')) { data/network-manager-1.27.91/src/nm-ip4-config.c:2339:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(domain); data/network-manager-1.27.91/src/nm-ip4-config.c:2879:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guint8 *) s, strlen(s)); data/network-manager-1.27.91/src/nm-ip4-config.c:2890:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guint8 *) s, strlen(s)); data/network-manager-1.27.91/src/nm-ip4-config.c:2895:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guint8 *) s, strlen(s)); data/network-manager-1.27.91/src/nm-ip4-config.c:2900:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guint8 *) s, strlen(s)); data/network-manager-1.27.91/src/nm-ip6-config.c:2369:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guint8 *) s, strlen(s)); data/network-manager-1.27.91/src/nm-ip6-config.c:2374:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guint8 *) s, strlen(s)); data/network-manager-1.27.91/src/nm-ip6-config.c:2379:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_checksum_update(sum, (const guint8 *) s, strlen(s)); data/network-manager-1.27.91/src/nm-l3-config-data.c:1305:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(domain); data/network-manager-1.27.91/src/nm-logging.c:536:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(_all_logging_domains_to_str) == sizeof(_all_logging_domains_to_str) - 1); data/network-manager-1.27.91/src/nm-logging.c:595:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _iovec_set(iov, str, strlen(str)); data/network-manager-1.27.91/src/nm-logging.c:629:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(_len == strlen(_buf)); \ data/network-manager-1.27.91/src/nm-logging.c:640:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(_str_arg &&strlen(_str_arg) < (max_str_len)); \ data/network-manager-1.27.91/src/nm-manager.c:6632:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) > 0 && g_strcmp0(line, "lo=lo") != 0) { data/network-manager-1.27.91/src/nm-manager.c:7868:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(KERNEL_FIRMWARE_DIR)) { data/network-manager-1.27.91/src/nm-policy.c:505:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ret = sethostname(hostname, strlen(hostname)); data/network-manager-1.27.91/src/nm-policy.c:563:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(hostname) >= HOST_NAME_BUFSIZE - 1) { data/network-manager-1.27.91/src/nm-test-utils-core.h:83:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(!label || strlen(label) < NMP_IFNAMSIZ); data/network-manager-1.27.91/src/platform/nm-fake-platform.c:237:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(!name || strlen(name) < IFNAMSIZ); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:1026:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(contents, cont, strlen(cont) + 1); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5207:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(value) + 1; data/network-manager-1.27.91/src/platform/nm-linux-platform.c:5520:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(pathid); data/network-manager-1.27.91/src/platform/nm-linux-platform.c:7597:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NLA_PUT(nlmsg, IFLA_IFNAME, strlen(name) + 1, name); data/network-manager-1.27.91/src/platform/nm-netlink.h:257:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return nla_put(msg, attrtype, strlen(str) + 1, str); data/network-manager-1.27.91/src/platform/nm-netlink.h:306:75: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define NLA_PUT_STRING(msg, attrtype, value) NLA_PUT(msg, attrtype, (int) strlen(value) + 1, value) data/network-manager-1.27.91/src/platform/nm-platform-utils.c:392:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(needle && strlen(needle) < ETH_GSTRING_LEN); data/network-manager-1.27.91/src/platform/nm-platform-utils.c:408:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(needle && strlen(needle) < ETH_GSTRING_LEN); data/network-manager-1.27.91/src/platform/nm-platform.c:2041:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) + 1 > IFNAMSIZ) data/network-manager-1.27.91/src/platform/nm-platform.c:2569:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_sprintf_buf_unsafe_a(strlen(category) + strlen(option) + 2, "%s/%s", category, option); data/network-manager-1.27.91/src/platform/nm-platform.c:2569:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_sprintf_buf_unsafe_a(strlen(category) + strlen(option) + 2, "%s/%s", category, option); data/network-manager-1.27.91/src/platform/nm-platform.c:2590:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_sprintf_buf_unsafe_a(strlen(category) + strlen(option) + 2, "%s/%s", category, option); data/network-manager-1.27.91/src/platform/nm-platform.c:2590:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_sprintf_buf_unsafe_a(strlen(category) + strlen(option) + 2, "%s/%s", category, option); data/network-manager-1.27.91/src/platform/nm-platform.c:2717:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(b); data/network-manager-1.27.91/src/platform/nm-platform.c:2727:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(b); data/network-manager-1.27.91/src/platform/nm-platform.c:3552:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_return_val_if_fail(!label || strlen(label) < sizeof(((NMPlatformIP4Address *) NULL)->label), data/network-manager-1.27.91/src/platform/nm-platform.c:6441:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(buf) < buf_size); data/network-manager-1.27.91/src/platform/nm-platform.h:1429:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const gsize _l = strlen(path); \ data/network-manager-1.27.91/src/platform/nmp-object.c:1004:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(b); data/network-manager-1.27.91/src/platform/nmp-object.c:1014:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(b); data/network-manager-1.27.91/src/platform/nmp-object.c:1024:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(b); data/network-manager-1.27.91/src/platform/nmp-object.c:2093:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(ifname) < IFNAMSIZ); data/network-manager-1.27.91/src/platform/nmp-object.c:2292:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ifname) >= IFNAMSIZ) data/network-manager-1.27.91/src/platform/tests/test-common.c:2362:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(pipefd_p2c[0], read_buf, sizeof(read_buf)); data/network-manager-1.27.91/src/platform/tests/test-common.c:2374:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(pipefd_c2p[0], &errsv, sizeof(errsv)); data/network-manager-1.27.91/src/platform/tests/test-common.c:2448:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_return_val_if_fail(ns_name && ns_name[0] && strlen(ns_name) < 50, 0); data/network-manager-1.27.91/src/platform/tests/test-platform-general.c:66:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(s); data/network-manager-1.27.91/src/settings/nm-agent-manager.c:310:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). id_len = strlen(identifier); data/network-manager-1.27.91/src/settings/nm-settings-plugin.h:130:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(klass && klass->plugin_name && strlen(klass->plugin_name) > 0); data/network-manager-1.27.91/src/settings/nm-settings-utils.c:110:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(uuid) + 1; data/network-manager-1.27.91/src/settings/nm-settings.c:187:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_p_1 = strlen(uuid) + 1; data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-plugin.c:154:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(storage->unmanaged_spec) > 0); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-plugin.c:157:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(strlen(storage->unrecognized_spec) > 0); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:179:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). secret = nm_secret_buf_new(strlen(password_raw) / 2 + 3); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2161:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strcmp(device, item + strlen(IFCFG_TAG)) != 0) { data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2806:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(v) != 8) { data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:2854:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(val) != 8) { data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:3111:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (value[0] && strlen(value) < 64) data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:3114:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NM_IN_SET(strlen(value), 10, 26)) { data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:3124:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (!strncmp(value, "s:", 2) && NM_IN_SET(strlen(value), 7, 15)) { data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:3382:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). plen = strlen(psk); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:4127:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (value && strlen(value)) data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:4254:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize value_len = strlen(value); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:5349:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = sanitized = g_malloc0(strlen(p) + 1); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-reader.c:6382:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(device); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:71:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(base); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:72:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tag_len = strlen(tag); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:88:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(base, IFCFG_TAG, strlen(IFCFG_TAG)) != 0) { data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:91:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strncmp(base, KEYS_TAG, strlen(KEYS_TAG)) != 0 data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:92:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strncmp(base, ROUTE_TAG, strlen(ROUTE_TAG)) != 0 data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:93:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strncmp(base, ROUTE6_TAG, strlen(ROUTE6_TAG)) != 0) data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:344:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(alias, IFCFG_TAG, strlen(IFCFG_TAG))) data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:348:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(ifcfg); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:754:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(tag_len == strlen(tag)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.c:1094:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(ti->key_name); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-utils.h:137:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return nms_ifcfg_rh_utils_is_numbered_tag_impl(key, tag, strlen(tag), out_idx); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:709:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(key) == 5 || strlen(key) == 13) { data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:709:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(key) == 5 || strlen(key) == 13) { data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:757:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str->str) && (dynamic_wep == FALSE)) data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:772:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(str->str) && (dynamic_wep == FALSE)) data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2856:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base_ifcfg_name_len = strlen(base_ifcfg_name); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2859:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base_name = base_ifcfg_name + strlen(IFCFG_TAG); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/nms-ifcfg-rh-writer.c:2860:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). base_name_len = strlen(base_name); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:160:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). q = dest = g_malloc(strlen(source) * 4 + 1 + 3); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:212:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_assert(q - dest <= strlen(source) * 4 + 1 + 3); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:340:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *str = g_string_new_len(NULL, strlen(value) + 3); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:672:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _line_link_parse(s, p, strlen(p)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/shvar.c:798:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(line->key_with_prefix, line->key, strlen(line->key) + 1); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:159:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(uuid); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:193:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(search); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:199:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_string_erase(str, i, strlen(search)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2629:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2712:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2745:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2786:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2840:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:2914:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3207:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3310:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3352:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:3532:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(nm_utils_gbytes_equal_mem(ssid, expected_ssid, strlen(expected_ssid))); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6329:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6427:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6521:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6616:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6714:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6815:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:6911:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7019:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7124:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7234:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7361:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7497:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7612:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7733:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:7852:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(ssid_data, strlen(ssid_data)); data/network-manager-1.27.91/src/settings/plugins/ifcfg-rh/tests/test-ifcfg-rh.c:8183:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssid = g_bytes_new(str_ssid, strlen(str_ssid)); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:43:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_type = strlen(type) + 1; data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:44:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_name = strlen(name) + 1; data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:68:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_key = strlen(key) + 1; data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:69:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l_data = strlen(data) + 1; data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:95:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(dst, " "); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-interface-parser.c:138:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(line); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:111:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(curr->data); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:145:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(curr->data); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:167:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *endc = valuec + strlen(valuec); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:170:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *result = malloc(strlen(valuec) + 1); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:178:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(result_cur, delim, next - delim); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:182:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*delim && strlen(valuec) > GPOINTER_TO_UINT(delim - valuec)) { data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:183:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(result_cur, delim, endc - delim); data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:205:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) >= 8 && strlen(value) <= 64) data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:205:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) >= 8 && strlen(value) <= 64) data/network-manager-1.27.91/src/settings/plugins/ifupdown/nms-ifupdown-parser.c:452:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(netmask_v) < 7) { data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-reader.c:139:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gsize l = strlen(filename); data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:41:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename); data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:226:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_filename_tmp[strlen(full_filename_tmp) - 1] = '\0'; data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:248:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_filename = g_strndup(full_filename_tmp, strlen(full_filename_tmp) - 1); data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-utils.c:282:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_filename_tmp[strlen(full_filename_tmp) - 1] = '\0'; data/network-manager-1.27.91/src/settings/plugins/keyfile/nms-keyfile-writer.c:50:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *p = path + strlen(info->keyfile_dir); data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:829:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpmem(ssid_data, ssid_len, expected_ssid, strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:884:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpmem(tmp, strlen(tmp), tmpssid, sizeof(tmpssid)); data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:908:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpmem(ssid_data, ssid_len, expected_ssid, strlen(expected_ssid)); data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:992:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(nm_utils_gbytes_equal_mem(ssid, expected_ssid, strlen(expected_ssid))); data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:1010:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(nm_utils_gbytes_equal_mem(ssid, expected_ssid, strlen(expected_ssid))); data/network-manager-1.27.91/src/settings/plugins/keyfile/tests/test-keyfile-settings.c:2160:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(nm_utils_gbytes_equal_mem(ssid, expected_ssid, strlen(expected_ssid))); data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:119:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(value); data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:239:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). opt->len = strlen(opt->value); data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:545:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!nm_supplicant_config_add_option(self, "bssid", bssid, strlen(bssid), NULL, error)) data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:572:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(freqs), data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:645:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return nm_supplicant_config_add_option(self, name, field, strlen(field), hidden, error); data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:729:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!key || (key_len = strlen(key)) == 0) data/network-manager-1.27.91/src/supplicant/nm-supplicant-config.c:877:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t psk_len = strlen(psk); data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:236:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gs_unref_bytes GBytes *bgscan = g_bytes_new(bgscan_data, strlen(bgscan_data)); data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:451:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int short_psk = strlen(psk) < 8; data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:535:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(key2), data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:541:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(key2), data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:658:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gs_unref_bytes GBytes *bgscan = g_bytes_new(bgscan_data, strlen(bgscan_data)); data/network-manager-1.27.91/src/supplicant/tests/test-supplicant-config.c:710:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gs_unref_bytes GBytes *bgscan = g_bytes_new(bgscan_data, strlen(bgscan_data)); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-identifier.c:204:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). id = siphash24(name, strlen(name), HASH_KEY.bytes); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c:44:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(*s); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp-option.c:60:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(*s); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:213:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(*s); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/dhcp6-option.c:255:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(*s); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:66:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(name); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/network-internal.c:504:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!ascii_is_valid(n) || strlen(n) >= IFALIASZ) { data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:567:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_return(strlen(mudurl) <= 255, -EINVAL); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:581:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(*p) > 255) data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:942:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(client->hostname), client->hostname); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:953:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(client->vendor_class_identifier), data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp-client.c:962:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(client->mudurl), data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:465:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert_return(strlen(mudurl) <= UINT8_MAX, -EINVAL); data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:481:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(*p) > UINT16_MAX) data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:502:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(*p) > UINT8_MAX) data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:656:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SD_DHCP6_OPTION_MUD_URL, strlen(client->mudurl), data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:687:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SD_DHCP6_OPTION_MUD_URL, strlen(client->mudurl), data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:752:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SD_DHCP6_OPTION_MUD_URL, strlen(client->mudurl), data/network-manager-1.27.91/src/systemd/src/libsystemd-network/sd-dhcp6-client.c:804:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SD_DHCP6_OPTION_MUD_URL, strlen(client->mudurl), data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:2827:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ss = read(fd, &x, sizeof(x)); data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:3003:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(d->fd, &si, sizeof(si)); data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-event/sd-event.c:3052:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(d->fd, &d->buffer, sizeof(d->buffer)); data/network-manager-1.27.91/src/systemd/src/libsystemd/sd-id128/id128-util.c:45:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(s); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:206:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). err = read(pipefd[0], &tmp, sizeof(tmp)); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:624:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(ifname), data/network-manager-1.27.91/src/tests/test-core-with-expect.c:626:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). MIN(15, strlen(parent_names[i]) + strlen(vlan_id_s))); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:626:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). MIN(15, strlen(parent_names[i]) + strlen(vlan_id_s))); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:628:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(ifname[strlen(ifname) - strlen(vlan_id_s)] == '.'); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:628:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(ifname[strlen(ifname) - strlen(vlan_id_s)] == '.'); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:629:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(strncmp(ifname, parent_names[i], strlen(ifname) - strlen(vlan_id_s)) == 0); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:629:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(strncmp(ifname, parent_names[i], strlen(ifname) - strlen(vlan_id_s)) == 0); data/network-manager-1.27.91/src/tests/test-core-with-expect.c:631:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(ifname), ==, 15); data/network-manager-1.27.91/src/tests/test-core.c:1695:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_utils_strbuf_append_bin(_buf, _len, _str, strlen(_str)); \ data/network-manager-1.27.91/src/tests/test-core.c:1723:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nm_utils_strbuf_append_bin(_buf, _len, _str, _str ? strlen(_str) : 0); \ data/network-manager-1.27.91/src/tests/test-core.c:1770:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(str), ==, s_len); data/network-manager-1.27.91/src/tests/test-core.c:1800:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (t_len > 0 && strlen(str) >= buf_len && (nmtst_get_rand_uint32() % 2)) { data/network-manager-1.27.91/src/tests/test-core.c:1815:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (buf_len > 0 && strlen(str) + 1 > buf_len) { data/network-manager-1.27.91/src/tests/test-core.c:1881:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert_cmpint(strlen(buf), ==, s_len); data/network-manager-1.27.91/src/tests/test-core.c:2278:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). g_assert(strlen(machine_id_str) == 32); data/network-manager-1.27.91/src/tests/test-core.c:2383:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u64 = c_siphash_hash(HASH_KEY, (const guint8 *) d->ifname, strlen(d->ifname)); data/network-manager-1.27.91/src/tests/test-core.c:2400:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(d->ifname)); data/network-manager-1.27.91/src/tests/test-core.c:2426:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(d->ifname)))); data/network-manager-1.27.91/src/tests/test-systemd.c:262:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_base64), data/network-manager-1.27.91/src/tests/test-systemd.c:270:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = nm_sd_utils_unbase64mem(base64, strlen(base64), TRUE, &exp3_arr, &exp3_len); data/network-manager-1.27.91/src/tests/test-systemd.c:286:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). r = nm_sd_utils_unbase64mem(base64, strlen(base64), TRUE, &exp_arr, &exp_len); data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:1088:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (priv->banner && strlen(priv->banner)) { data/network-manager-1.27.91/src/vpn/nm-vpn-connection.c:2589:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(setting_name)) { ANALYSIS SUMMARY: Hits = 1990 Lines analyzed = 574134 in approximately 12.46 seconds (46074 lines/second) Physical Source Lines of Code (SLOC) = 414828 Hits@level = [0] 106 [1] 696 [2] 1177 [3] 51 [4] 64 [5] 2 Hits@level+ = [0+] 2096 [1+] 1990 [2+] 1294 [3+] 117 [4+] 66 [5+] 2 Hits/KSLOC@level+ = [0+] 5.0527 [1+] 4.79717 [2+] 3.11937 [3+] 0.282045 [4+] 0.159102 [5+] 0.00482128 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.